Your message dated Tue, 17 Apr 2012 18:50:11 +0000
with message-id <e1skdtf-00025a...@franck.debian.org>
and subject line Bug#665407: fixed in siege 2.70-3
has caused the Debian Bug report #665407,
regarding siege: FTBFS[!linux] problematic private definittion of INT_MAX
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
665407: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=665407
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:siege
Version: 2.70-2
Severity: serious
Tags: sid wheezy patch
User: debian-...@lists.debian.org
Usertags: kfreebsd
X-Debbugs-Cc: debian-...@lists.debian.org
Justification: fails to build from source (but built successfully in the past)
Hi!
Your package failed to build on the kfreebsd-* buildds:
gcc -DHAVE_CONFIG_H -I. -I. -I../include -I/usr/include/openssl -I/usr/include
-I/usr/include/openssl -I/usr/include -D_REENTRANT -D_POSIX_PTHREAD_SEMANTICS
-W -Wall -DOPENSSL_NO_KRB5 -g -O2 -c client.c
In file included from /usr/include/limits.h:153:0,
from
/usr/lib/gcc/x86_64-kfreebsd-gnu/4.6/include-fixed/limits.h:169,
from
/usr/lib/gcc/x86_64-kfreebsd-gnu/4.6/include-fixed/syslimits.h:7,
from
/usr/lib/gcc/x86_64-kfreebsd-gnu/4.6/include-fixed/limits.h:34,
from /usr/include/x86_64-kfreebsd-gnu/bits/socket.h:31,
from /usr/include/x86_64-kfreebsd-gnu/sys/socket.h:40,
from /usr/include/netinet/in.h:25,
from ./client.h:31,
from client.c:24:
/usr/include/x86_64-kfreebsd-gnu/bits/xopen_lim.h:95:6: error: missing binary
operator before token "("
/usr/include/x86_64-kfreebsd-gnu/bits/xopen_lim.h:98:7: error: missing binary
operator before token "("
client.c: In function 'http_request':
client.c:193:12: warning: variable 'len' set but not used
[-Wunused-but-set-variable]
make[2]: *** [client.o] Error 1
src/setup.h
>>>>>>>>>>>
#ifndef INT_MIN
# define INT_MIN (~0 << (sizeof (int) * CHAR_BIT - 1))
#endif
#ifndef INT_MAX
# define INT_MAX (~0 - INT_MIN)
#endif
<<<<<<<<<<<
This breaks simple
>>>>>>>>>>>
# if INT_MAX == 32767
<<<<<<<<<<<
including limits.h so INT_MAX is already defined and doesn't get set to
this insane value. (Note: some of these #include <limits.h> are guarded
by HAVE_LIMITS_H, some are not)
Full build log at
https://buildd.debian.org/status/fetch.php?pkg=siege&arch=kfreebsd-amd64&ver=2.70-2&stamp=1332535409
Regards
Christoph
If you have further questions please mail debian-...@lists.debian.org
--- siege-2.70.orig/src/setup.h
+++ siege-2.70/src/setup.h
@@ -33,6 +33,7 @@
#include <pthread.h>
#include <ctype.h>
#include <stdarg.h>
+#include <limits.h>
#if HAVE_SYS_WAIT_H
# include <sys/wait.h>
--
9FED 5C6C E206 B70A 5857 70CA 9655 22B9 D49A E731
Debian Developer | Lisp Hacker | CaCert Assurer
--- End Message ---
--- Begin Message ---
Source: siege
Source-Version: 2.70-3
We believe that the bug you reported is fixed in the latest version of
siege, which is due to be installed in the Debian FTP archive:
siege_2.70-3.debian.tar.gz
to main/s/siege/siege_2.70-3.debian.tar.gz
siege_2.70-3.dsc
to main/s/siege/siege_2.70-3.dsc
siege_2.70-3_amd64.deb
to main/s/siege/siege_2.70-3_amd64.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 665...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Josue Abarca <jmasli...@debian.org.gt> (supplier of updated siege package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Sat, 14 Apr 2012 15:34:58 -0600
Source: siege
Binary: siege
Architecture: source amd64
Version: 2.70-3
Distribution: unstable
Urgency: low
Maintainer: Josue Abarca <jmasli...@debian.org.gt>
Changed-By: Josue Abarca <jmasli...@debian.org.gt>
Description:
siege - HTTP regression testing and benchmarking utility
Closes: 665407
Changes:
siege (2.70-3) unstable; urgency=low
.
* setup.h.diff patch added in order to improve the definition of
INT_MAX. (Closes: #665407)
* debian/control Standards-Version increased to 3.9.3, no changes
required.
Checksums-Sha1:
4b1f417a8000a7ab5b0759a275ad89226f1abf85 1879 siege_2.70-3.dsc
23423f5e61d6a08efb60f2a7794658878e87336b 11465 siege_2.70-3.debian.tar.gz
d40ccd56253f056d35168e7392d8a7378cde71b8 94162 siege_2.70-3_amd64.deb
Checksums-Sha256:
4c714f6e6cd2dc3a92616d73c99e940acf5d34eba6c463815225d8c8b589ffc4 1879
siege_2.70-3.dsc
1fe5f0ec120cb0fb247b53de8adb413926d18315e9e9ee86b93a53b84ade18b4 11465
siege_2.70-3.debian.tar.gz
0732bfca040264d0959dd9b495fa1050fbc027a80d532aa959cb1d85fdd33ac4 94162
siege_2.70-3_amd64.deb
Files:
65a441924ab1c0cbe387408b75f84762 1879 web optional siege_2.70-3.dsc
843e90c77ac464707125f0d75ac0006e 11465 web optional siege_2.70-3.debian.tar.gz
565cb41ea0eec412017d3ef8fbd773fe 94162 web optional siege_2.70-3_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iQIcBAEBCAAGBQJPjbhfAAoJEBLZsEqQy9jk97gP/1MT5IZyPj4jlpvEmPJXrS9r
VMitQ2peF6b87hCyl7k5vEq3a6O7OR0ybHIB/pTn92WNcK3KbEBfhMKVstbxF76d
o/BbsEXSDQX9eSOdDCDBtkGCu+ztT067pcPVZ4Sz+yfGnZ4PQEXtQivJj+uFtLDZ
Cs4dW/YEObKUwz8Glj7c5KIP2kV4HjUpQqOHoN1pVKCEEwRa3+p23HwXL9BrbCNA
7J4mSC+OQPpcyP1g+ZLR6pB4ChyOrXo95BS9uLE78h5eN7X9g/NJIaTmgYAqIVIV
6+PuXFPSa4mks75u5ymfiEr32dr2UTviIaP4M/rHzguFn+zNpbblStm0Xw3KiIRM
aH2JtecAmaoZ1uo3oE3A5CabxF4t8dIfgq4lChzgjuHaE/RdgpjddvG5jAhx7VIk
bIYP7tQeh3Oq+RlMo7rzGnmVwWWNBXrR0W4px0GCmQB+RsuJHBNY5oSIi6B/ee26
M3ytKtPB4bGuxzMAE+Yhg5aYTaTB69X6VUqiDwFBgZ3cY1FY58vvIW7S4cZz0nQG
cWuPOR3Fpje0l7k5TOooxUolsyokcLRjvxKP/+BPCT7oogYjmVpYyLCEucNHhYLO
84gVPDR8bsSH+deafFCQVLqM9s/ejY1/9yB0hdEk5M8g0kK5DLEQRCNjRAt44pfQ
MsWT/41sMkRwqHEPjM6e
=A73L
-----END PGP SIGNATURE-----
--- End Message ---