Your message dated Mon, 23 Nov 2020 01:18:27 +0000
with message-id <e1kh0ut-0002sf...@fasolo.debian.org>
and subject line Bug#973120: fixed in netatalk 3.1.12~ds-6
has caused the Debian Bug report #973120,
regarding netatalk: FTBFS: bufferevent_openssl.c:106:3: error: invalid use of 
incomplete typedef ‘BIO’ {aka ‘struct bio_st’}
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
973120: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973120
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: netatalk
Version: 3.1.12~ds-5
Severity: serious
Justification: FTBFS on amd64
Tags: bullseye sid ftbfs
Usertags: ftbfs-20201027 ftbfs-bullseye

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.

Relevant part (hopefully):
> /bin/bash ./libtool  --tag=CC   --mode=compile gcc -DHAVE_CONFIG_H -I.  
> -I./compat -I./include -I./include  -Wdate-time -D_FORTIFY_SOURCE=2  -g -O2 
> -fdebug-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong -Wformat 
> -Werror=format-security -Wall -fno-strict-aliasing -pthread -c -o 
> bufferevent_openssl.lo bufferevent_openssl.c
> libtool: compile:  gcc -DHAVE_CONFIG_H -I. -I./compat -I./include -I./include 
> -Wdate-time -D_FORTIFY_SOURCE=2 -g -O2 
> "-fdebug-prefix-map=/<<PKGBUILDDIR>>=." -fstack-protector-strong -Wformat 
> -Werror=format-security -Wall -fno-strict-aliasing -pthread -c 
> bufferevent_openssl.c  -fPIC -DPIC -o .libs/bufferevent_openssl.o
> bufferevent_openssl.c: In function ‘bio_bufferevent_new’:
> bufferevent_openssl.c:106:3: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   106 |  b->init = 0;
>       |   ^~
> bufferevent_openssl.c:107:3: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   107 |  b->num = -1;
>       |   ^~
> bufferevent_openssl.c:108:3: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   108 |  b->ptr = NULL; /* We'll be putting the bufferevent in this field.*/
>       |   ^~
> bufferevent_openssl.c:109:3: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   109 |  b->flags = 0;
>       |   ^~
> bufferevent_openssl.c: In function ‘bio_bufferevent_free’:
> bufferevent_openssl.c:119:7: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   119 |  if (b->shutdown) {
>       |       ^~
> bufferevent_openssl.c:120:8: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   120 |   if (b->init && b->ptr)
>       |        ^~
> bufferevent_openssl.c:120:19: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   120 |   if (b->init && b->ptr)
>       |                   ^~
> bufferevent_openssl.c:121:22: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   121 |    bufferevent_free(b->ptr);
>       |                      ^~
> bufferevent_openssl.c:122:4: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   122 |   b->init = 0;
>       |    ^~
> bufferevent_openssl.c:123:4: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   123 |   b->flags = 0;
>       |    ^~
> bufferevent_openssl.c:124:4: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   124 |   b->ptr = NULL;
>       |    ^~
> bufferevent_openssl.c: In function ‘bio_bufferevent_read’:
> bufferevent_openssl.c:140:8: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   140 |  if (!b->ptr)
>       |        ^~
> bufferevent_openssl.c:143:33: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   143 |  input = bufferevent_get_input(b->ptr);
>       |                                 ^~
> bufferevent_openssl.c: In function ‘bio_bufferevent_write’:
> bufferevent_openssl.c:159:31: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   159 |  struct bufferevent *bufev = b->ptr;
>       |                               ^~
> bufferevent_openssl.c:165:8: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   165 |  if (!b->ptr)
>       |        ^~
> bufferevent_openssl.c: In function ‘bio_bufferevent_ctrl’:
> bufferevent_openssl.c:191:31: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   191 |  struct bufferevent *bufev = b->ptr;
>       |                               ^~
> bufferevent_openssl.c:196:10: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   196 |   ret = b->shutdown;
>       |          ^~
> bufferevent_openssl.c:199:4: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   199 |   b->shutdown = (int)num;
>       |    ^~
> bufferevent_openssl.c: At top level:
> bufferevent_openssl.c:228:1: error: variable ‘methods_bufferevent’ has 
> initializer but incomplete type
>   228 | static BIO_METHOD methods_bufferevent = {
>       | ^~~~~~
> bufferevent_openssl.c:79:27: warning: excess elements in struct initializer
>    79 | #define BIO_TYPE_LIBEVENT 57
>       |                           ^~
> bufferevent_openssl.c:229:2: note: in expansion of macro ‘BIO_TYPE_LIBEVENT’
>   229 |  BIO_TYPE_LIBEVENT, "bufferevent",
>       |  ^~~~~~~~~~~~~~~~~
> bufferevent_openssl.c:79:27: note: (near initialization for 
> ‘methods_bufferevent’)
>    79 | #define BIO_TYPE_LIBEVENT 57
>       |                           ^~
> bufferevent_openssl.c:229:2: note: in expansion of macro ‘BIO_TYPE_LIBEVENT’
>   229 |  BIO_TYPE_LIBEVENT, "bufferevent",
>       |  ^~~~~~~~~~~~~~~~~
> bufferevent_openssl.c:229:21: warning: excess elements in struct initializer
>   229 |  BIO_TYPE_LIBEVENT, "bufferevent",
>       |                     ^~~~~~~~~~~~~
> bufferevent_openssl.c:229:21: note: (near initialization for 
> ‘methods_bufferevent’)
> bufferevent_openssl.c:230:2: warning: excess elements in struct initializer
>   230 |  bio_bufferevent_write,
>       |  ^~~~~~~~~~~~~~~~~~~~~
> bufferevent_openssl.c:230:2: note: (near initialization for 
> ‘methods_bufferevent’)
> bufferevent_openssl.c:231:2: warning: excess elements in struct initializer
>   231 |  bio_bufferevent_read,
>       |  ^~~~~~~~~~~~~~~~~~~~
> bufferevent_openssl.c:231:2: note: (near initialization for 
> ‘methods_bufferevent’)
> bufferevent_openssl.c:232:2: warning: excess elements in struct initializer
>   232 |  bio_bufferevent_puts,
>       |  ^~~~~~~~~~~~~~~~~~~~
> bufferevent_openssl.c:232:2: note: (near initialization for 
> ‘methods_bufferevent’)
> bufferevent_openssl.c:233:2: warning: excess elements in struct initializer
>   233 |  NULL /* bio_bufferevent_gets */,
>       |  ^~~~
> bufferevent_openssl.c:233:2: note: (near initialization for 
> ‘methods_bufferevent’)
> bufferevent_openssl.c:234:2: warning: excess elements in struct initializer
>   234 |  bio_bufferevent_ctrl,
>       |  ^~~~~~~~~~~~~~~~~~~~
> bufferevent_openssl.c:234:2: note: (near initialization for 
> ‘methods_bufferevent’)
> bufferevent_openssl.c:235:2: warning: excess elements in struct initializer
>   235 |  bio_bufferevent_new,
>       |  ^~~~~~~~~~~~~~~~~~~
> bufferevent_openssl.c:235:2: note: (near initialization for 
> ‘methods_bufferevent’)
> bufferevent_openssl.c:236:2: warning: excess elements in struct initializer
>   236 |  bio_bufferevent_free,
>       |  ^~~~~~~~~~~~~~~~~~~~
> bufferevent_openssl.c:236:2: note: (near initialization for 
> ‘methods_bufferevent’)
> bufferevent_openssl.c:237:2: warning: excess elements in struct initializer
>   237 |  NULL /* callback_ctrl */,
>       |  ^~~~
> bufferevent_openssl.c:237:2: note: (near initialization for 
> ‘methods_bufferevent’)
> bufferevent_openssl.c: In function ‘BIO_new_bufferevent’:
> bufferevent_openssl.c:257:8: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   257 |  result->init = 1;
>       |        ^~
> bufferevent_openssl.c:258:8: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   258 |  result->ptr = bufferevent;
>       |        ^~
> bufferevent_openssl.c:259:8: error: invalid use of incomplete typedef ‘BIO’ 
> {aka ‘struct bio_st’}
>   259 |  result->shutdown = close_flag ? 1 : 0;
>       |        ^~
> bufferevent_openssl.c: At top level:
> bufferevent_openssl.c:228:19: error: storage size of ‘methods_bufferevent’ 
> isn’t known
>   228 | static BIO_METHOD methods_bufferevent = {
>       |                   ^~~~~~~~~~~~~~~~~~~
> make[5]: *** [Makefile:915: bufferevent_openssl.lo] Error 1

The full build log is available from:
   http://qa-logs.debian.net/2020/10/27/netatalk_3.1.12~ds-5_unstable.log

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.

--- End Message ---
--- Begin Message ---
Source: netatalk
Source-Version: 3.1.12~ds-6
Done: Jonas Smedegaard <d...@jones.dk>

We believe that the bug you reported is fixed in the latest version of
netatalk, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 973...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jonas Smedegaard <d...@jones.dk> (supplier of updated netatalk package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 23 Nov 2020 02:05:30 +0100
Source: netatalk
Architecture: source
Version: 3.1.12~ds-6
Distribution: unstable
Urgency: medium
Maintainer: Debian Netatalk team <pkg-netatalk-de...@lists.alioth.debian.org>
Changed-By: Jonas Smedegaard <d...@jones.dk>
Closes: 973120
Changes:
 netatalk (3.1.12~ds-6) unstable; urgency=medium
 .
   * use system-shared libevent:
     + add patch cherry-picked from upstream merge-request
       to avoid embedded libevent
     + unfuzz patch 101
     + exclude libevent when repackaging upstream source
     + build-depend on libevent-dev
   * fix stop needlessly depend on libpam-cracklib
   * link with libssl and Kerberos;
     build-depend on libcrack2-dev libkrb5-dev libssl-dev;
     closes: bug#973120, thanks to Lucas Nussbaum
Checksums-Sha1:
 6556e27af25c6842caa5ab20367097c8c86864cd 2557 netatalk_3.1.12~ds-6.dsc
 f7f446056e8016e196919bd01262a961dd960adc 56964 
netatalk_3.1.12~ds-6.debian.tar.xz
 31e5a56ad1ded243e53e2c7cb5c3ccab8aeb95c2 10339 
netatalk_3.1.12~ds-6_amd64.buildinfo
Checksums-Sha256:
 b631e1405290a53920f01da006bdf3718789b0991695be4857e2964abe98a9c4 2557 
netatalk_3.1.12~ds-6.dsc
 8a0e05915119c0050fc68171493e7e8b0fb9c0d50757064ce31a145a435eae3d 56964 
netatalk_3.1.12~ds-6.debian.tar.xz
 0797d9378d0c6cd378d08b48a766e796ff81fb3884bea3ae0bc498485c184c45 10339 
netatalk_3.1.12~ds-6_amd64.buildinfo
Files:
 d6272288a6c703bb4955f4ac90ecf20c 2557 net optional netatalk_3.1.12~ds-6.dsc
 31b4aa72b98885924ae0a0b3ba421fe3 56964 net optional 
netatalk_3.1.12~ds-6.debian.tar.xz
 981d7d9d522fdfbff0e50af1ebb40202 10339 net optional 
netatalk_3.1.12~ds-6_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=Rgxq
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to