GNU bug report logs - #58737
[PATCH] gnu: cl+ssl: Update to 0.0.0-4.8c13317

Previous Next

Package: guix-patches;

Reported by: cage <cage-dev <at> twistfold.it>

Date: Sun, 23 Oct 2022 10:19:03 UTC

Severity: normal

Tags: patch

Done: Guillaume Le Vaillant <glv <at> posteo.net>

Bug is archived. No further changes may be made.

To add a comment to this bug, you must first unarchive it, by sending
a message to control AT debbugs.gnu.org, with unarchive 58737 in the body.
You can then email your comments to 58737 AT debbugs.gnu.org in the normal way.

Toggle the display of automated, internal messages from the tracker.

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to guix-patches <at> gnu.org:
bug#58737; Package guix-patches. (Sun, 23 Oct 2022 10:19:03 GMT) Full text and rfc822 format available.

Acknowledgement sent to cage <cage-dev <at> twistfold.it>:
New bug report received and forwarded. Copy sent to guix-patches <at> gnu.org. (Sun, 23 Oct 2022 10:19:03 GMT) Full text and rfc822 format available.

Message #5 received at submit <at> debbugs.gnu.org (full text, mbox):

From: cage <cage-dev <at> twistfold.it>
To: guix-patches <at> gnu.org
Subject: [PATCH] gnu: cl+ssl: Update to 0.0.0-4.8c13317
Date: Sun, 23 Oct 2022 12:05:23 +0200
---
 gnu/packages/lisp-xyz.scm | 7 ++++---
 1 file changed, 4 insertions(+), 3 deletions(-)

diff --git a/gnu/packages/lisp-xyz.scm b/gnu/packages/lisp-xyz.scm
index b474a0f2b7..c8544f9563 100644
--- a/gnu/packages/lisp-xyz.scm
+++ b/gnu/packages/lisp-xyz.scm
@@ -4336,8 +4336,8 @@ (define-public ecl-md5
      (list ecl-flexi-streams))))

 (define-public sbcl-cl+ssl
-  (let ((commit "046d698cf65539faf9aba0a5ccd086a9d6f53eef")
-        (revision "3"))
+  (let ((commit "8c13317509136e6722a25be51b74b813bbb32f9e")
+        (revision "4"))
     (package
       (name "sbcl-cl+ssl")
       (version (git-version "0.0.0" revision commit))
@@ -4349,7 +4349,7 @@ (define-public sbcl-cl+ssl
                (commit commit)))
          (file-name (git-file-name "cl+ssl" version))
          (sha256
-          (base32 "110yhb0f1c8yilqsgza2xhv3675i41iizylibgy5qc5fa2lnaxbv"))))
+          (base32 "1cdq9dzk804y8bm874q8755yk4iz2z735ksm8waxl52kpfw8ai99"))))
       (build-system asdf-build-system/sbcl)
       (arguments
        '(#:phases
@@ -4383,6 +4383,7 @@ (define-public sbcl-cl+ssl
              sbcl-trivial-garbage
              sbcl-alexandria
              sbcl-trivial-features
+             sbcl-trivial-sockets
              sbcl-usocket))
       (home-page "https://common-lisp.net/project/cl-plus-ssl/")
       (synopsis "Common Lisp bindings to OpenSSL")
--
2.34.0




Reply sent to Guillaume Le Vaillant <glv <at> posteo.net>:
You have taken responsibility. (Mon, 24 Oct 2022 12:21:01 GMT) Full text and rfc822 format available.

Notification sent to cage <cage-dev <at> twistfold.it>:
bug acknowledged by developer. (Mon, 24 Oct 2022 12:21:02 GMT) Full text and rfc822 format available.

Message #10 received at 58737-done <at> debbugs.gnu.org (full text, mbox):

From: Guillaume Le Vaillant <glv <at> posteo.net>
To: cage <cage-dev <at> twistfold.it>
Cc: 58737-done <at> debbugs.gnu.org
Subject: Re: [bug#58737] [PATCH] gnu: cl+ssl: Update to 0.0.0-4.8c13317
Date: Mon, 24 Oct 2022 12:17:07 +0000
[Message part 1 (text/plain, inline)]
Patch pushed as 541c4998a848b763e1ad1576571837306cdc0ebf with some
modifications.
Given that trivial-sockets used for the tests is not available for ECL,
I removed it from the native inputs of ecl-cl+ssl and disabled the
tests.
[signature.asc (application/pgp-signature, inline)]

bug archived. Request was from Debbugs Internal Request <help-debbugs <at> gnu.org> to internal_control <at> debbugs.gnu.org. (Mon, 21 Nov 2022 12:24:09 GMT) Full text and rfc822 format available.

This bug report was last modified 2 years and 214 days ago.

Previous Next


GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.