Your message dated Wed, 09 Nov 2016 15:11:05 +0000
with message-id <e1c4uwn-0000di...@fasolo.debian.org>
and subject line Bug#828604: fixed in xca 1.3.2-2
has caused the Debian Bug report #828604,
regarding xca: FTBFS with openssl 1.1.0
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
828604: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=828604
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: xca
Version: 1.3.2-1
Severity: important
Control: block 827061 by -1
Hi,
OpenSSL 1.1.0 is about to released. During a rebuild of all packages using
OpenSSL this package fail to build. A log of that build can be found at:
https://breakpoint.cc/openssl-1.1-rebuild-2016-05-29/Attempted/xca_1.3.2-1_amd64-20160529-1554
On https://wiki.openssl.org/index.php/1.1_API_Changes you can see various of the
reasons why it might fail. There are also updated man pages at
https://www.openssl.org/docs/manmaster/ that should contain useful information.
There is a libssl-dev package available in experimental that contains a recent
snapshot, I suggest you try building against that to see if everything works.
If you have problems making things work, feel free to contact us.
Kurt
--- End Message ---
--- Begin Message ---
Source: xca
Source-Version: 1.3.2-2
We believe that the bug you reported is fixed in the latest version of
xca, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 828...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Tino Mettler <tino+deb...@tikei.de> (supplier of updated xca package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 09 Nov 2016 14:53:14 +0100
Source: xca
Binary: xca
Architecture: source amd64
Version: 1.3.2-2
Distribution: unstable
Urgency: medium
Maintainer: Tino Mettler <tino+deb...@tikei.de>
Changed-By: Tino Mettler <tino+deb...@tikei.de>
Description:
xca - x509 Certification Authority management tool based on QT4
Closes: 828604
Changes:
xca (1.3.2-2) unstable; urgency=medium
.
* Enable all hardening flags, not just the default
* Drop override for clean, it isn't needed anymore
* Use dh-autoreconf to fix build failure when built twice in a row
* Change Vcs-Git to the repository used for packaging, not upstream
* Bump standards version, no changes needed
* Add 0002-Fix-clean-target.patch to remove all generated files during clean
* Add 0003-Allow-to-specify-CPPFLAGS-on-the-command-line.patch to use
the CPPFLAGS environment variable
* Drop 0001-Use-Debian-specific-CPPFLAGS.patch which is replaced by the obove
patch
* Build-Depend on libssl1.0-dev to fix FTBFS with OpenSSL 1.1
(Closes: #828604)
* Don't strip xca, the xca-dbgsym package needs the debug symbols
Checksums-Sha1:
3593daa13570b5b6dc9125b2567702b7f1097e8e 1826 xca_1.3.2-2.dsc
dda8fb751f61437cd89e32ccce5fe6111e3c847e 897947 xca_1.3.2.orig.tar.gz
96d2c0e941d6210ecc4ff2ad125c439dec59fcf3 7192 xca_1.3.2-2.debian.tar.xz
3ea7d2e8560cc29086a1ac9ad54bf2f599d81772 10943238 xca-dbgsym_1.3.2-2_amd64.deb
f02f7029be4bc6c992a53ac3281a76521ec8c3e5 6719
xca_1.3.2-2_20161109T141549z-67a90bea.buildinfo
4067e0820930ce16cb8401bd9310e85f5227a8f1 735562 xca_1.3.2-2_amd64.deb
Checksums-Sha256:
3783d232c8eff8f32ac3dc3135e41051737e9ad9b66c6aad4f35501600bd5572 1826
xca_1.3.2-2.dsc
04f11f2148c8369c1a1b4e109956ed8cc807ec266d0d936410624ba8ee4b5ce4 897947
xca_1.3.2.orig.tar.gz
ad99592978c9c5a05fa901dfe35bf410021fa398a841ca3d190932d976033007 7192
xca_1.3.2-2.debian.tar.xz
a4ff4358000b77200c86dab1d1b661502999ea3092737b31fcb9e142296c6805 10943238
xca-dbgsym_1.3.2-2_amd64.deb
b5d42de72adf0eedf18b0cb73d74b56f5f08c391a9e810144124fda5629a4d48 6719
xca_1.3.2-2_20161109T141549z-67a90bea.buildinfo
f0ae33b7bb12d111ef740d63df4d041a97ff81d0cd54c8899c8c429006eea271 735562
xca_1.3.2-2_amd64.deb
Files:
0bf385c5d127d34017c8304711127962 1826 x11 optional xca_1.3.2-2.dsc
f9528164f46a78c7a2373778bc019c48 897947 x11 optional xca_1.3.2.orig.tar.gz
8b13788eafc6bdc1a941ab673ecf39a1 7192 x11 optional xca_1.3.2-2.debian.tar.xz
d10413be8dd4963c841f1ebdb0ca32c5 10943238 debug extra
xca-dbgsym_1.3.2-2_amd64.deb
67a90bea62d682c4276cfe9c6bec1f45 6719 x11 optional
xca_1.3.2-2_20161109T141549z-67a90bea.buildinfo
746b2ab98fc5c78a0ade8a59d5301f50 735562 x11 optional xca_1.3.2-2_amd64.deb
-----BEGIN PGP SIGNATURE-----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=xW53
-----END PGP SIGNATURE-----
--- End Message ---