Your message dated Fri, 14 Mar 2025 01:42:09 +0000
with message-id <e1tsu3t-00hhjy...@fasolo.debian.org>
and subject line Bug#1088155: fixed in libgnupg-interface-perl 1.04-6
has caused the Debian Bug report #1088155,
regarding libgnupg-interface-perl: Testsuite errors against gnupg2 2.4.6 and 
2.2.46-4
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1088155: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088155
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: libgnupg-interface-perl
Version: 1.04-4
Severity: normal
X-Debbugs-Cc: gnu...@packages.debian.org

Hello,

libgnupg-interface-perl throws testsuite erors agains gpg 2.4.6-1:

t/get_public_keys.t ........
1..3
ok 1
not ok 2
not ok 3
Failed 2/3 subtests
gpg: WARNING: server 'gpg-agent' is older than us (2.2.45 < 2.4.6)
gpg: Note: Outdated servers may lack important security fixes.
gpg: Note: Use the command "gpgconf --kill all" to restart them.
gpg: problem with fast path key listing: IPC parameter error - ignored
t/get_secret_keys.t ........
1..2
ok 1
not ok 2
Failed 1/2 subtests
...
t/list_secret_keys.t ....... 
1..4
ok 1
not ok 2
ok 3
ok 4
Failed 1/4 subtests 

(Noise regarding gpg-agent due to running with sid's gpg agent and
wrangling $PATH to find the newer gpg.)

This also shows up with unaptched 1.04.

cu Andreas

-- System Information:
Debian Release: trixie/sid
  APT prefers testing
  APT policy: (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 6.11.9-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=de_AT.UTF-8, LC_CTYPE=de_AT.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
-- 
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'

--- End Message ---
--- Begin Message ---
Source: libgnupg-interface-perl
Source-Version: 1.04-6
Done: gregor herrmann <gre...@debian.org>

We believe that the bug you reported is fixed in the latest version of
libgnupg-interface-perl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1088...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
gregor herrmann <gre...@debian.org> (supplier of updated 
libgnupg-interface-perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 14 Mar 2025 01:52:17 +0100
Source: libgnupg-interface-perl
Architecture: source
Version: 1.04-6
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group <pkg-perl-maintain...@lists.alioth.debian.org>
Changed-By: gregor herrmann <gre...@debian.org>
Closes: 1088155
Changes:
 libgnupg-interface-perl (1.04-6) unstable; urgency=medium
 .
   * Team upload.
 .
   [ Daniel Kahn Gillmor ]
   * note forwarding flexible validity marker upstream
 .
   [ gregor herrmann ]
   * Update years of packaging copyright.
   * Declare compliance with Debian Policy 4.7.2.
   * Add bug closer to 1.04-5 changelog entry.
 .
 libgnupg-interface-perl (1.04-5) unstable; urgency=medium
 .
   [ gregor herrmann ]
   * Update debian/upstream/metadata to use Github for bugs.
 .
   [ Daniel Kahn Gillmor ]
   * Add e-mail addresses to patch authorship fields
   * Clarify comment in patch
   * Accept variant reports of validity for expired signatures on 2.2
     (see #1100074 and https://dev.gnupg.org/T7547)
     Closes: #1088155
   * Further cleanup of test suite, including fixes for 2.4
Checksums-Sha1:
 6ec5cde9c23ab8722a9bd29bc1b9d438e1d2c8cc 2723 
libgnupg-interface-perl_1.04-6.dsc
 c5ca61206117d0dac4539d24bc4f01cc8e847adf 12704 
libgnupg-interface-perl_1.04-6.debian.tar.xz
Checksums-Sha256:
 9148db7f0e9a993e7c91d65895dd6ca4c323b5c71938768fb0ae85e1202b75ae 2723 
libgnupg-interface-perl_1.04-6.dsc
 dc5ad75d732c2cddc0162832b884dfede1874d979a93d10dd9c06d69b5bde302 12704 
libgnupg-interface-perl_1.04-6.debian.tar.xz
Files:
 d3eeea611a5f92565486b19b5bd3f889 2723 perl optional 
libgnupg-interface-perl_1.04-6.dsc
 69262b54d0c4f8af757641130ccf9dd9 12704 perl optional 
libgnupg-interface-perl_1.04-6.debian.tar.xz


-----BEGIN PGP SIGNATURE-----
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=iD0E
-----END PGP SIGNATURE-----

Attachment: pgpdZgJvqB4Dm.pgp
Description: PGP signature


--- End Message ---

Reply via email to