Your message dated Tue, 25 Apr 2006 10:47:17 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#297965: fixed in tac-plus 1:4.0.4.alpha-13
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: tac-plus
Severity: normal
Tags: patch
When building 'tac-plus' on amd64 with gcc-4.0,
I get the following error:
gcc -DTCPWRAPPER -DMAXSESS -DTACPLUS_USERID=64005 -DTACPLUS_GROUPID=64005
-DUSE_LDAP -DUSE_PAM -g -O2 -DLINUX -DGLIBC
-DTACPLUS_PIDFILE=\"/var/run/tac_plus.pid\" -L -I/usr/include/postgresql -DDB
-DDB_NULL -DDB_PGSQL -c -o config.o config.c
config.c:113: error: static declaration of 'nopasswd_str' follows non-static
declaration
parse.h:22: error: previous declaration of 'nopasswd_str' was here
make[1]: *** [config.o] Error 1
make[1]: Leaving directory `/tac-plus-F4.0.4.alpha'
make: *** [build-stamp] Error 2
With the attached patch 'tac-plus' can be compiled
on amd64 using gcc-4.0.
Regards
Andreas Jochens
diff -urN ../tmp-orig/tac-plus-F4.0.4.alpha/parse.h ./parse.h
--- ../tmp-orig/tac-plus-F4.0.4.alpha/parse.h 2005-03-03 20:33:04.972520707
+0100
+++ ./parse.h 2005-03-03 20:31:55.246979023 +0100
@@ -18,9 +18,6 @@
FITNESS FOR A PARTICULAR PURPOSE.
*/
-/* Dummy password, if nopasswd is specified */
-extern char *nopasswd_str;
-
/* Keywords & values */
#define S_eof 99
--- End Message ---
--- Begin Message ---
Source: tac-plus
Source-Version: 1:4.0.4.alpha-13
We believe that the bug you reported is fixed in the latest version of
tac-plus, which is due to be installed in the Debian FTP archive:
tac-plus_4.0.4.alpha-13.diff.gz
to pool/main/t/tac-plus/tac-plus_4.0.4.alpha-13.diff.gz
tac-plus_4.0.4.alpha-13.dsc
to pool/main/t/tac-plus/tac-plus_4.0.4.alpha-13.dsc
tac-plus_4.0.4.alpha-13_i386.deb
to pool/main/t/tac-plus/tac-plus_4.0.4.alpha-13_i386.deb
tac-plus_4.0.4.alpha.orig.tar.gz
to pool/main/t/tac-plus/tac-plus_4.0.4.alpha.orig.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Eric Evans <[EMAIL PROTECTED]> (supplier of updated tac-plus package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Tue, 25 Apr 2006 11:56:42 -0500
Source: tac-plus
Binary: tac-plus
Architecture: source i386
Version: 1:4.0.4.alpha-13
Distribution: unstable
Urgency: low
Maintainer: Carlos Barros <[EMAIL PROTECTED]>
Changed-By: Eric Evans <[EMAIL PROTECTED]>
Description:
tac-plus - TACACS+ authentication daemon
Closes: 153428 285042 297965 333886 348237 355138
Changes:
tac-plus (1:4.0.4.alpha-13) unstable; urgency=low
.
* Acknowledge NMU, (Closes: 297965). Thanks Anibal.
* Reversioned to be more policy friendly, (Closes: #285042).
* Dropped current patches in favor of those from Devrim Seral's version
of tac-plus, (http://www.gazi.edu.tr/tacacs/), forward ported to
F4.0.4.alpha, and applied with dpatch.
* Updated build dependencies, (Closes: #333886).
* Added myself to Uploaders, (Carlos Barros and I will co-maintain
tac-plus).
* Updated config.guess and config.sub, (Closes: #355138).
* Delete tac_who.log on package purge, (Closes: #348237).
* Extended the init script to allow option setting from default file,
use "depends", "provides" and state in which runlevel runs.
* Applied tac-chroot.patch from http://www.gazi.edu.tr. This provides
tac_plus the ability to bind to a specific address, run in a chroot
jail, and improves the mechanism for dropping privileges.
* Patched to fix encryption key mismatch when running on 64 bit arches,
(Closes: #153428).
Files:
c5d02fac4e9747292014e2e6a92a7d45 714 net extra tac-plus_4.0.4.alpha-13.dsc
9884bba5fc56ec4c574122c11754c3de 122880 net extra
tac-plus_4.0.4.alpha.orig.tar.gz
7444f99a70d9649d02879d72d95f3390 83672 net extra
tac-plus_4.0.4.alpha-13.diff.gz
213d34a2159725389e5d8d83bf96d999 108080 net extra
tac-plus_4.0.4.alpha-13_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
iD8DBQFETl3t+DWPovKDPJMRAirPAJwPJzd4QGiQWkgGUdg74HNkGpwsewCgwHQj
WW9GAZRV2ubOe6bRkx0pdZY=
=8G+l
-----END PGP SIGNATURE-----
--- End Message ---