Your message dated Wed, 15 Oct 2014 22:21:43 +0000 with message-id <e1xewwx-0002rv...@franck.debian.org> and subject line Bug#765293: fixed in gnunet 0.10.1-2 has caused the Debian Bug report #765293, regarding gnunet: FTBFS on kfreebsd-*: error: malloc_np.h: No such file or directory to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 765293: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765293 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Source: gnunet Version: 0.10.1-1 Severity: serious Justification: fails to build from source (but built successfully in the past) gnunet failed to build on kfreebsd-*: | CC common_allocation.lo | In file included from common_allocation.c:26:0: | ../../src/include/platform.h:223:0: warning: "__BYTE_ORDER" redefined | #define __BYTE_ORDER BYTE_ORDER | ^ | In file included from /usr/include/endian.h:36:0, | from /usr/include/x86_64-kfreebsd-gnu/sys/types.h:216, | from ../../src/include/platform.h:48, | from common_allocation.c:26: | /usr/include/x86_64-kfreebsd-gnu/bits/endian.h:7:0: note: this is the location of the previous definition | #define __BYTE_ORDER __LITTLE_ENDIAN | ^ | In file included from common_allocation.c:26:0: | ../../src/include/platform.h:224:0: warning: "__BIG_ENDIAN" redefined | #define __BIG_ENDIAN BIG_ENDIAN | ^ | In file included from /usr/include/x86_64-kfreebsd-gnu/sys/types.h:216:0, | from ../../src/include/platform.h:48, | from common_allocation.c:26: | /usr/include/endian.h:32:0: note: this is the location of the previous definition | #define __BIG_ENDIAN 4321 | ^ | common_allocation.c:201:23: fatal error: malloc_np.h: No such file or directory | #include <malloc_np.h> | ^ | compilation terminated. | make[4]: *** [common_allocation.lo] Error 1 | Makefile:2229: recipe for target 'common_allocation.lo' failed For a full build log see https://buildd.debian.org/status/fetch.php?pkg=gnunet&arch=kfreebsd-amd64&ver=0.10.1-1&stamp=1412460116. Cheers -- Sebastian Ramacher
signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---Source: gnunet Source-Version: 0.10.1-2 We believe that the bug you reported is fixed in the latest version of gnunet, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 765...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Bertrand Marc <beberk...@gmail.com> (supplier of updated gnunet package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Wed, 15 Oct 2014 21:44:26 +0200 Source: gnunet Binary: gnunet gnunet-client gnunet-common gnunet-dbg gnunet-server gnunet-dev Architecture: source all Version: 0.10.1-2 Distribution: unstable Urgency: medium Maintainer: Bertrand Marc <beberk...@gmail.com> Changed-By: Bertrand Marc <beberk...@gmail.com> Description: gnunet - secure, trust-based peer-to-peer framework (meta) gnunet-client - transitional dummy package gnunet-common - transitional dummy package gnunet-dbg - secure, trust-based peer-to-peer framework (debug) gnunet-dev - secure, trust-based peer-to-peer framework (development) gnunet-server - transitional dummy package Closes: 765293 Changes: gnunet (0.10.1-2) unstable; urgency=medium . * Put the upstream signing key in debian/upstream/signing-key.asc and remove debian/source/include-binaries. * debian/control: update homepage as www.gnunet.org does not work anymore. * Fix FTBFS on kfreebsd (Closes: #765293). Thanks to Steven Chamberlain for testing it. + Add a patch to check properly the existence of malloc_np.h. + debian/rules: remove the file selection on kfreebsd as all binaries are built now. * debian/rules: use debhelpers -indep and -arch targets to make sure nothing is built unnecessary on an arch-indep build. Checksums-Sha1: b687d71f1319a36dbb23356b91e6f58560e1b241 2611 gnunet_0.10.1-2.dsc 21ff92ad1940ce35ca5b40fbb5c38be06462ab01 37816 gnunet_0.10.1-2.debian.tar.xz 93f08b7f9cf247f1ed556a42b8a46f4dc7289bff 111962 gnunet-client_0.10.1-2_all.deb d74c2ee994b224ee285b66be5131ce4becc3b5fd 111962 gnunet-common_0.10.1-2_all.deb a89334ccadc019938fd604161dad5656af049043 111966 gnunet-server_0.10.1-2_all.deb Checksums-Sha256: 96313a7ee197a8e6dae2b1bdc31ddde75b6b748caea0d97005ab9408a65bc715 2611 gnunet_0.10.1-2.dsc 456267cecae6014655cdbd0df0aa1de3f177aeae5ff3fde709e4eb526e680b15 37816 gnunet_0.10.1-2.debian.tar.xz 8050027e2367e7e11fa13ceaf42cc882dda1bd6a7f0955d1dba6e692edf4cfc2 111962 gnunet-client_0.10.1-2_all.deb bba167fd3ef9a1c8e3a2a85958d9b77630e9edc2726721902976a7e8d97b250b 111962 gnunet-common_0.10.1-2_all.deb ac8db8488966c187ae03de1de9eb3d25f6c7284449f84199edcd0fb85626ae44 111966 gnunet-server_0.10.1-2_all.deb Files: e260f429bf8202675abce7bfaf717361 2611 net optional gnunet_0.10.1-2.dsc c1214c987fa13df986088bbb5c524a83 37816 net optional gnunet_0.10.1-2.debian.tar.xz ff5b99ad67303e78699d24f5cada4b77 111962 net optional gnunet-client_0.10.1-2_all.deb 7586cb70077f4f0921b74ffb6d3269fd 111962 net optional gnunet-common_0.10.1-2_all.deb dda5e410af891d90fb09befa6a6483b3 111966 net optional gnunet-server_0.10.1-2_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIVAwUBVD7p3gkauFYGmqocAQjBSxAAlJ3i2S3TlNBsZ9O1qi78wgtL+YvShyAx +j7X4Qj98bSW5EifBo9IR93gA6g5uhp1+0hhZCImdy139+fnBV8aKlqHnqXK0GsY BnIvYg6qDvc/0ZUY6fzIjjfz68DKnRi8dJ6kONkFwdEgJu2vAfs0XbNsb4yLqlie UICD64ENT0+5zTzshVLMFctRemBmWtFucp6LdoxN9nvtZ8BtAhpcL5RgBto/VaDf nCHnUqqiD4rO/Z0c8tuOWkcwZicliVUxp+QHMZB38Xm85L4JRMLY0mjZfb8zhA6H R878PREKlR9z9FUvL2KdLntv4iqq+9C4GfeBfeMt7a/8XQs4zSKdSyodB45ypw9W X3A9MB9fdkMjjZOaMEllaErHzBK95jkfs2nZRD5kakfSXFtpD8wRMwagIvq9iEMi XxXp8vwxos1WjF93gPZq0vUK4bvvwAey7fEmsLNx+YskMOa2LTY0uTLO199FyhCY BrovaP5Toe4eoa8AbS+sOx4jgr7dTk6Wj7pZNOlTRCnR47GMdsKo4i4iPky40vLo j774qg5dlekJ8jSo5wez7BmB6Lz7Nml59LDA1BIC64JEhWfuBMVOtJCEUbGEJJFs C9kzaZc073M2yk+r3VOvuiVd+31sP0OcY013L9zHkmQ5OU9nCcE/b1htzgtsUqkh Ca/mBJA0v3o= =cqmn -----END PGP SIGNATURE-----
--- End Message ---