<div dir="ltr">close #982715</div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Sun, Feb 14, 2021 at 9:57 PM Debian Bug Tracking System <<a href="mailto:owner@bugs.debian.org">owner@bugs.debian.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Your message dated Sun, 14 Feb 2021 21:53:57 +0000<br>
with message-id <<a href="mailto:E1lBPL3-000F1I-1A@fasolo.debian.org" target="_blank">E1lBPL3-000F1I-1A@fasolo.debian.org</a>><br>
and subject line Bug#982715: fixed in ruby-redis-store 1.9.0-1<br>
has caused the Debian Bug report #982715,<br>
regarding ruby-redis-rack: FTBFS: ERROR: Test "ruby2.7" failed: ArgumentError: unknown keywords: :path, :domain, :expire_after, :secure, :httponly, :defer, :renew, :sidbits, :secure_random, :redis_server<br>
to be marked as done.<br>
<br>
This means that you claim that the problem has been dealt with.<br>
If this is not the case it is now your responsibility to reopen the<br>
Bug report if necessary, and/or fix the problem forthwith.<br>
<br>
(NB: If you are a system administrator and have no idea what this<br>
message is talking about, this may indicate a serious mail system<br>
misconfiguration somewhere. Please contact <a href="mailto:owner@bugs.debian.org" target="_blank">owner@bugs.debian.org</a><br>
immediately.)<br>
<br>
<br>
-- <br>
982715: <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982715" rel="noreferrer" target="_blank">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982715</a><br>
Debian Bug Tracking System<br>
Contact <a href="mailto:owner@bugs.debian.org" target="_blank">owner@bugs.debian.org</a> with problems<br>
<br><br><br>---------- Forwarded message ----------<br>From: Lucas Nussbaum <<a href="mailto:lucas@debian.org" target="_blank">lucas@debian.org</a>><br>To: <a href="mailto:submit@bugs.debian.org" target="_blank">submit@bugs.debian.org</a><br>Cc: <br>Bcc: <br>Date: Sat, 13 Feb 2021 18:10:10 +0100<br>Subject: ruby-redis-rack: FTBFS: ERROR: Test "ruby2.7" failed: ArgumentError: unknown keywords: :path, :domain, :expire_after, :secure, :httponly, :defer, :renew, :sidbits, :secure_random, :redis_server<br>Source: ruby-redis-rack<br>
Version: 2.1.2-4<br>
Severity: serious<br>
Justification: FTBFS on amd64<br>
Tags: bullseye sid ftbfs<br>
Usertags: ftbfs-20210213 ftbfs-bullseye<br>
<br>
Hi,<br>
<br>
During a rebuild of all packages in sid, your package failed to build<br>
on amd64.<br>
<br>
Relevant part (hopefully):<br>
> ArgumentError: unknown keywords: :path, :domain, :expire_after, :secure, :httponly, :defer, :renew, :sidbits, :secure_random, :redis_server<br>
> /usr/share/rubygems-integration/all/gems/redis-4.2.5/lib/redis.rb:836:in `set'<br>
> /usr/lib/ruby/vendor_ruby/redis/store/interface.rb:9:in `set'<br>
> /usr/lib/ruby/vendor_ruby/redis/store/ttl.rb:8:in `set'<br>
> /usr/lib/ruby/vendor_ruby/redis/store/serialization.rb:5:in `block in set'<br>
> /usr/lib/ruby/vendor_ruby/redis/store/serialization.rb:39:in `_marshal'<br>
> /usr/lib/ruby/vendor_ruby/redis/store/serialization.rb:5:in `set'<br>
> /usr/lib/ruby/vendor_ruby/redis/store/namespace.rb:7:in `block in set'<br>
> /usr/lib/ruby/vendor_ruby/redis/store/namespace.rb:84:in `namespace'<br>
> /usr/lib/ruby/vendor_ruby/redis/store/namespace.rb:7:in `set'<br>
> /<<PKGBUILDDIR>>/lib/rack/session/redis.rb:49:in `block (2 levels) in write_session'<br>
> /<<PKGBUILDDIR>>/lib/redis/rack/connection.rb:22:in `with'<br>
> /<<PKGBUILDDIR>>/lib/rack/session/redis.rb:82:in `with'<br>
> /<<PKGBUILDDIR>>/lib/rack/session/redis.rb:49:in `block in write_session'<br>
> /<<PKGBUILDDIR>>/lib/rack/session/redis.rb:70:in `with_lock'<br>
> /<<PKGBUILDDIR>>/lib/rack/session/redis.rb:48:in `write_session'<br>
> /usr/lib/ruby/vendor_ruby/rack/session/abstract/id.rb:391:in `commit_session'<br>
> /usr/lib/ruby/vendor_ruby/rack/session/abstract/id.rb:271:in `context'<br>
> /usr/lib/ruby/vendor_ruby/rack/session/abstract/id.rb:263:in `call'<br>
> /usr/lib/ruby/vendor_ruby/rack/mock.rb:77:in `request'<br>
> /usr/lib/ruby/vendor_ruby/rack/mock.rb:59:in `get'<br>
> /<<PKGBUILDDIR>>/test/rack/session/redis_test.rb:153:in `block (3 levels) in <top (required)>'<br>
> /<<PKGBUILDDIR>>/test/rack/session/redis_test.rb:396:in `with_pool_management'<br>
> /<<PKGBUILDDIR>>/test/rack/session/redis_test.rb:151:in `block (2 levels) in <top (required)>'<br>
> /usr/lib/ruby/vendor_ruby/minitest/test.rb:98:in `block (3 levels) in run'<br>
> /usr/lib/ruby/vendor_ruby/minitest/test.rb:195:in `capture_exceptions'<br>
> /usr/lib/ruby/vendor_ruby/minitest/test.rb:95:in `block (2 levels) in run'<br>
> /usr/lib/ruby/vendor_ruby/minitest.rb:270:in `time_it'<br>
> /usr/lib/ruby/vendor_ruby/minitest/test.rb:94:in `block in run'<br>
> /usr/lib/ruby/vendor_ruby/minitest.rb:365:in `on_signal'<br>
> /usr/lib/ruby/vendor_ruby/minitest/test.rb:211:in `with_info_handler'<br>
> /usr/lib/ruby/vendor_ruby/minitest/test.rb:93:in `run'<br>
> /usr/lib/ruby/vendor_ruby/minitest.rb:1029:in `run_one_method'<br>
> /usr/lib/ruby/vendor_ruby/minitest.rb:339:in `run_one_method'<br>
> /usr/lib/ruby/vendor_ruby/minitest.rb:326:in `block (2 levels) in run'<br>
> /usr/lib/ruby/vendor_ruby/minitest.rb:325:in `each'<br>
> /usr/lib/ruby/vendor_ruby/minitest.rb:325:in `block in run'<br>
> /usr/lib/ruby/vendor_ruby/minitest.rb:365:in `on_signal'<br>
> /usr/lib/ruby/vendor_ruby/minitest.rb:352:in `with_info_handler'<br>
> /usr/lib/ruby/vendor_ruby/minitest.rb:324:in `run'<br>
> /usr/lib/ruby/vendor_ruby/minitest.rb:164:in `block in __run'<br>
> /usr/lib/ruby/vendor_ruby/minitest.rb:164:in `map'<br>
> /usr/lib/ruby/vendor_ruby/minitest.rb:164:in `__run'<br>
> /usr/lib/ruby/vendor_ruby/minitest.rb:141:in `run'<br>
> /usr/lib/ruby/vendor_ruby/minitest.rb:68:in `block in autorun'<br>
> <br>
> 34 runs, 78 assertions, 0 failures, 10 errors, 0 skips<br>
> pkill redis-server<br>
> rake aborted!<br>
> Tests failed<br>
> /<<PKGBUILDDIR>>/debian/ruby-tests.rake:12:in `block in <top (required)>'<br>
> /usr/share/rubygems-integration/all/gems/rake-13.0.3/exe/rake:27:in `<top (required)>'<br>
> Tasks: TOP => default<br>
> (See full trace by running task with --trace)<br>
> ERROR: Test "ruby2.7" failed: <br>
<br>
The full build log is available from:<br>
<a href="http://qa-logs.debian.net/2021/02/13/ruby-redis-rack_2.1.2-4_unstable.log" rel="noreferrer" target="_blank">http://qa-logs.debian.net/2021/02/13/ruby-redis-rack_2.1.2-4_unstable.log</a><br>
<br>
A list of current common problems and possible solutions is available at<br>
<a href="http://wiki.debian.org/qa.debian.org/FTBFS" rel="noreferrer" target="_blank">http://wiki.debian.org/qa.debian.org/FTBFS</a> . You're welcome to contribute!<br>
<br>
If you reassign this bug to another package, please marking it as 'affects'-ing<br>
this package. See <a href="https://www.debian.org/Bugs/server-control#affects" rel="noreferrer" target="_blank">https://www.debian.org/Bugs/server-control#affects</a><br>
<br>
If you fail to reproduce this, please provide a build log and diff it with me<br>
so that we can identify if something relevant changed in the meantime.<br>
<br>
About the archive rebuild: The rebuild was done on EC2 VM instances from<br>
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every<br>
failed build was retried once to eliminate random failures.<br>
<br><br><br>---------- Forwarded message ----------<br>From: Debian FTP Masters <<a href="mailto:ftpmaster@ftp-master.debian.org" target="_blank">ftpmaster@ftp-master.debian.org</a>><br>To: <a href="mailto:982715-close@bugs.debian.org" target="_blank">982715-close@bugs.debian.org</a><br>Cc: <br>Bcc: <br>Date: Sun, 14 Feb 2021 21:53:57 +0000<br>Subject: Bug#982715: fixed in ruby-redis-store 1.9.0-1<br>Source: ruby-redis-store<br>
Source-Version: 1.9.0-1<br>
Done: Cédric Boutillier <<a href="mailto:boutil@debian.org" target="_blank">boutil@debian.org</a>><br>
<br>
We believe that the bug you reported is fixed in the latest version of<br>
ruby-redis-store, which is due to be installed in the Debian FTP archive.<br>
<br>
A summary of the changes between this version and the previous one is<br>
attached.<br>
<br>
Thank you for reporting the bug, which will now be closed. If you<br>
have further comments please address them to <a href="mailto:982715@bugs.debian.org" target="_blank">982715@bugs.debian.org</a>,<br>
and the maintainer will reopen the bug report if appropriate.<br>
<br>
Debian distribution maintenance software<br>
pp.<br>
Cédric Boutillier <<a href="mailto:boutil@debian.org" target="_blank">boutil@debian.org</a>> (supplier of updated ruby-redis-store package)<br>
<br>
(This message was generated automatically at their request; if you<br>
believe that there is a problem with it please contact the archive<br>
administrators by mailing <a href="mailto:ftpmaster@ftp-master.debian.org" target="_blank">ftpmaster@ftp-master.debian.org</a>)<br>
<br>
<br>
-----BEGIN PGP SIGNED MESSAGE-----<br>
Hash: SHA512<br>
<br>
Format: 1.8<br>
Date: Sun, 14 Feb 2021 22:19:44 +0100<br>
Source: ruby-redis-store<br>
Architecture: source<br>
Version: 1.9.0-1<br>
Distribution: unstable<br>
Urgency: medium<br>
Maintainer: Debian Ruby Team <<a href="mailto:pkg-ruby-extras-maintainers@lists.alioth.debian.org" target="_blank">pkg-ruby-extras-maintainers@lists.alioth.debian.org</a>><br>
Changed-By: Cédric Boutillier <<a href="mailto:boutil@debian.org" target="_blank">boutil@debian.org</a>><br>
Closes: 982707 982715<br>
Changes:<br>
ruby-redis-store (1.9.0-1) unstable; urgency=medium<br>
.<br>
* Team upload<br>
.<br>
[ Utkarsh Gupta ]<br>
* Add salsa-ci.yml<br>
.<br>
[ Debian Janitor ]<br>
* Trim trailing whitespace.<br>
* Use secure copyright file specification URI.<br>
* Use secure URI in debian/watch.<br>
* Bump debhelper from old 11 to 12.<br>
* Set debhelper-compat version in Build-Depends.<br>
* Set upstream metadata fields: Bug-Database, Bug-Submit, Repository,<br>
Repository-Browse.<br>
* Update Vcs-* headers from URL redirect.<br>
* Use canonical URL in Vcs-Git.<br>
.<br>
[ Cédric Boutillier ]<br>
* New upstream version 1.9.0<br>
+ Compatibility with ruby-redis client 4.2.x (Closes: #982707, #982715)<br>
* Update team name<br>
* Add .gitattributes to keep unwanted files out of the source package<br>
* Move debian/watch to <a href="http://gemwatch.debian.net" rel="noreferrer" target="_blank">gemwatch.debian.net</a><br>
* Refresh packaging with dh-make-ruby -w<br>
* Drop CVE-2017-1000248.patch, applied upstream<br>
* Refresh patch to exclude dependency on pry too<br>
* Bump Standards-Version to 4.5.1 (no changes needed)<br>
* Bump debhelper compatibility level to 13<br>
Checksums-Sha1:<br>
26f6d9cb98ac8574e5826de93148e63d2500dc06 1824 ruby-redis-store_1.9.0-1.dsc<br>
3dd812007f54a13b3d207f2d603b6ca74542df09 21963 ruby-redis-store_1.9.0.orig.tar.gz<br>
c9716995024ec9f779db89fa77d0773cabe1856c 3648 ruby-redis-store_1.9.0-1.debian.tar.xz<br>
8553299a74137f4671807fe1555ce0589cde872b 8957 ruby-redis-store_1.9.0-1_amd64.buildinfo<br>
Checksums-Sha256:<br>
d41150969bb9867830fa9234702cc9f236fa22ab50f4c1ce5897db7dd226098a 1824 ruby-redis-store_1.9.0-1.dsc<br>
dc8d234d2cea5777383b5865c085791b13fa6abe95c2c2cbc82dc1a09ab6ffab 21963 ruby-redis-store_1.9.0.orig.tar.gz<br>
8ac7ef2d342c16ca9312bf0018e5de125579b7877a7c0e31b39516c58d7252f1 3648 ruby-redis-store_1.9.0-1.debian.tar.xz<br>
78ddd76738cc80d13c12fb8809fa9e9bd944622c548c158341d14acc3be8bf01 8957 ruby-redis-store_1.9.0-1_amd64.buildinfo<br>
Files:<br>
81db3ccbc5ec2f02f6f01471538fea39 1824 ruby optional ruby-redis-store_1.9.0-1.dsc<br>
b1a7e06cd3ed0a149867e2cd9f7975db 21963 ruby optional ruby-redis-store_1.9.0.orig.tar.gz<br>
24f17a941e0a222681f4ce321bcbe491 3648 ruby optional ruby-redis-store_1.9.0-1.debian.tar.xz<br>
918636960fb4ddd1b7d9e9080ae61e2c 8957 ruby optional ruby-redis-store_1.9.0-1_amd64.buildinfo<br>
<br>
-----BEGIN PGP SIGNATURE-----<br>
<br>
iQEzBAEBCgAdFiEEnM1rMZ2/jkCrGr0aia+CtznNIXoFAmApmCcACgkQia+CtznN<br>
IXoyJAf/ZBviqfGjc09qvKF/p3LCbEFGrLDRzzn9cG+QlxEHHmqNrJkNs6MOlKcm<br>
Oe59LgrPWlbkGUPdYcfX1oULIzZA/3heUFMPJjfyHmsVj5xGHy73eKCWdcaxTOb7<br>
/WbCjY6hdjCJ1O6CuUBGZZ8Yx5YEFPWoyzXJCXK2KU+PE+MstWPEr/0V+rgKpEqF<br>
wnNNdPQMvHUkzll8uYRLbIRogX9LH7twAfk8aJ9UGWJmKrUivsnB4L3Zt2ghOAHD<br>
Z6/6lPdsxmUG9bzbMsw08iFu4JzlW9cErF/DEmXViYtodpKcU03DjTjUDHImcVtk<br>
n44G4NeOKwuIpG37xWXB5lVPPuHQ2w==<br>
=QSxU<br>
-----END PGP SIGNATURE-----</blockquote></div>