Your message dated Sat, 23 Mar 2024 15:54:16 +0000
with message-id <e1ro3hi-0046pa...@fasolo.debian.org>
and subject line Bug#1066687: fixed in gpw 0.0.19940601-11
has caused the Debian Bug report #1066687,
regarding gpw: FTBFS: gpw.c:50:18: error: implicit declaration of function
‘pw_random_number’ [-Werror=implicit-function-declaration]
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1066687: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066687
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: gpw
Version: 0.0.19940601-10
Severity: serious
Justification: FTBFS
Tags: trixie sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-20240313 ftbfs-trixie ftbfs-impfuncdef
Hi,
During a rebuild of all packages in sid, your package failed to build
on amd64.
This is most likely caused by a change in dpkg 1.22.6, that enabled
-Werror=implicit-function-declaration. For more information, see
https://wiki.debian.org/qa.debian.org/FTBFS#A2024-03-13_-Werror.3Dimplicit-function-declaration
Relevant part (hopefully):
> cc -Wdate-time -D_FORTIFY_SOURCE=2 -g -O2
> -Werror=implicit-function-declaration -ffile-prefix-map=/<<PKGBUILDDIR>>=.
> -fstack-protector-strong -fstack-clash-protection -Wformat
> -Werror=format-security -fcf-protection -Wl,-z,relro -g -o gpw.o -c gpw.c
> In file included from gpw.c:24:
> trigram.h:5:25: warning: overflow in conversion from ‘int’ to ‘short int’
> changes value from ‘67956’ to ‘2420’ [-Woverflow]
> 5 | const short sing[26] = {67956, 16446, 33242, 29683, 92097, 11146,
> 23682, 20490, 69461, 2080, 9057, 43064, 23656, 59577, 51269, 23100, 1604,
> 59717, 95874, 54763, 27214, 8436, 8002, 2312, 13164, 3478};
> | ^~~~~
> trigram.h:5:53: warning: overflow in conversion from ‘int’ to ‘short int’
> changes value from ‘92097’ to ‘26561’ [-Woverflow]
> 5 | const short sing[26] = {67956, 16446, 33242, 29683, 92097, 11146,
> 23682, 20490, 69461, 2080, 9057, 43064, 23656, 59577, 51269, 23100, 1604,
> 59717, 95874, 54763, 27214, 8436, 8002, 2312, 13164, 3478};
> | ^~~~~
> trigram.h:5:81: warning: overflow in conversion from ‘int’ to ‘short int’
> changes value from ‘69461’ to ‘3925’ [-Woverflow]
> 5 | const short sing[26] = {67956, 16446, 33242, 29683, 92097, 11146,
> 23682, 20490, 69461, 2080, 9057, 43064, 23656, 59577, 51269, 23100, 1604,
> 59717, 95874, 54763, 27214, 8436, 8002, 2312, 13164, 3478};
> |
> ^~~~~
> trigram.h:5:148: warning: overflow in conversion from ‘int’ to ‘short int’
> changes value from ‘95874’ to ‘30338’ [-Woverflow]
> 5 | const short sing[26] = {67956, 16446, 33242, 29683, 92097, 11146,
> 23682, 20490, 69461, 2080, 9057, 43064, 23656, 59577, 51269, 23100, 1604,
> 59717, 95874, 54763, 27214, 8436, 8002, 2312, 13164, 3478};
> |
>
> ^~~~~
> gpw.c: In function ‘main’:
> gpw.c:50:18: error: implicit declaration of function ‘pw_random_number’
> [-Werror=implicit-function-declaration]
> 50 | srand48 (pw_random_number(LONG_MAX)); /* Set random seed.
> */
> | ^~~~~~~~~~~~~~~~
> cc1: some warnings being treated as errors
> make[2]: *** [debian/Makefile:25: gpw.o] Error 1
The full build log is available from:
http://qa-logs.debian.net/2024/03/13/gpw_0.0.19940601-10_unstable.log
All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20240313;users=lu...@debian.org
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20240313&fusertaguser=lu...@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results
A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!
If you reassign this bug to another package, please mark it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects
If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.
--- End Message ---
--- Begin Message ---
Source: gpw
Source-Version: 0.0.19940601-11
Done: Francesco Paolo Lovergine <fran...@debian.org>
We believe that the bug you reported is fixed in the latest version of
gpw, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1066...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Francesco Paolo Lovergine <fran...@debian.org> (supplier of updated gpw package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 23 Mar 2024 15:10:53 +0000
Source: gpw
Binary: gpw gpw-dbgsym
Architecture: source amd64
Version: 0.0.19940601-11
Distribution: unstable
Urgency: medium
Maintainer: Francesco Paolo Lovergine <fran...@debian.org>
Changed-By: Francesco Paolo Lovergine <fran...@debian.org>
Description:
gpw - Trigraph Password Generator
Closes: 1066687
Changes:
gpw (0.0.19940601-11) unstable; urgency=medium
.
* Introduced missing prototype before pw_randon_number() call in randnum
patch.
(closes: #1066687)
* Policy bumped to 4.6.2, no changes needed.
Checksums-Sha1:
a3008de3c5ca849904649ea90e6502ff45b66543 1779 gpw_0.0.19940601-11.dsc
9eda0135028e337d92a0fbeecf9cb967436f8622 6816 gpw_0.0.19940601-11.debian.tar.xz
72b2e93eee12d2c1fec4408b5eeffcd9f08bf474 7244
gpw-dbgsym_0.0.19940601-11_amd64.deb
a6f0d0b6cc763a59ef8aa9a92222e24d43ae117e 6454
gpw_0.0.19940601-11_amd64.buildinfo
b73be664197c39f9493d79011f9b8ca5dc104e9c 17348 gpw_0.0.19940601-11_amd64.deb
Checksums-Sha256:
f144d489e2e7ffec32fd6cd3d2a0b1f40ec9908c82d0a0fc72dded47bce86901 1779
gpw_0.0.19940601-11.dsc
3aa89bb9816f831ac162d1896f2bc6b7c13039f8e972062ff0ff741de452138d 6816
gpw_0.0.19940601-11.debian.tar.xz
5729fa1d55e7c02d8fe7e178b4acc7f7089f2c59c2737304dc3dba20e2f738b4 7244
gpw-dbgsym_0.0.19940601-11_amd64.deb
a917c0e0322cac27d8e5324de22ff6003f394f393c07b2e69ce2e201b3e763cd 6454
gpw_0.0.19940601-11_amd64.buildinfo
2d702830b3819a102eb25c8e36ff008452d8efe8fab052d6991d10f30242b5b3 17348
gpw_0.0.19940601-11_amd64.deb
Files:
ba4b30fc8030c64aa5de41552d7cefc5 1779 utils optional gpw_0.0.19940601-11.dsc
ed1708f2ef116d558eceda8cb4d56193 6816 utils optional
gpw_0.0.19940601-11.debian.tar.xz
1b77bdcdae0af0704627437f525319cc 7244 debug optional
gpw-dbgsym_0.0.19940601-11_amd64.deb
3e2a04ffe7202a1aa6c79f33bd453cc4 6454 utils optional
gpw_0.0.19940601-11_amd64.buildinfo
dce4bedf4749ff5cac6f4a21e0c0ba30 17348 utils optional
gpw_0.0.19940601-11_amd64.deb
-----BEGIN PGP SIGNATURE-----
iQJHBAEBCgAxFiEEBXmpeiI46/m+Ye0CDwKl4RY2hqQFAmX+8r0THGZyYW5raWVA
ZGViaWFuLm9yZwAKCRAPAqXhFjaGpPVxD/kB0t76XpHFItKi/OPo7O64V0qI2Vq1
6Q2VmjPi3TNUb9tJ4U7NhYV0pZSjWLU1HoB5IIoKI7oqh1ux6YajMC5P7hkfMiUm
cRn/9li8DY212Dlb4d6Df0uMHC2NC37b8ki7PDnWC1icgvbeqcBhHlDrpe9Zmqrz
iqvUmHObiaLcgi7jMeI6TFJp8ys3rj5VWVJE6C7DbJ1ZvwdF3mbwx7Z2QoJVa54P
yaxOnvWbvOPm0E48aGf7h6oKNUQJdCSRPGRiTc/zyiH4+hX3GIxdJx91GzfcKSlQ
k7wrIp3x59PN5NiM6abFOYAV6qO+D4P/a6nO1oAdpiFyO8U38Sc/0mYTz409gftx
kdlqRn3V6g1+dRS135ajnTAgXGgU4/w9WC7O9QkuWTaOtHzdNLHaadO+erT6WYBt
G2A8gw8djZP04pkLRM9maD1gOOIS9IReQwkhOGyPl85LQdw1H6LjKhjx6DW3t7iG
CKtRSvlD4oxZr4wWx0CEymNNC4OQ+pRLR2kKT4iWcd1rl1wTmKHCNGd2VY7ETdyt
02FyebB3prYCinSYYRCplB3DG/1p3ugflYhjyqiNhsXcDCe08ZID68P3VneJZlLq
xrVv7in3cbqwIppZ0DUNbGZjwMH0vByqlbcpESUnvDkJ7jM1+2Bxjah2m6ixGc3v
IXlkyccqbuN4Mw==
=UHuU
-----END PGP SIGNATURE-----
pgpMZRLTntTPR.pgp
Description: PGP signature
--- End Message ---