Your message dated Sat, 28 Nov 2015 00:33:59 +0000 with message-id <[email protected]> and subject line Bug#805165: fixed in netty-tcnative 1.1.33.Fork10-2 has caused the Debian Bug report #805165, regarding netty-tcnative: FTBFS: to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 805165: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=805165 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Source: netty-tcnative Version: 1.1.33.Fork10-1 Severity: serious Control: block 797926 by -1 Hi, Your package is failing to build with the following error on various arches: src/ssl.c: In function 'Java_org_apache_tomcat_jni_SSL_newMemBIO': src/ssl.c:1070:16: error: cast from pointer to integer of different size [-Werror=pointer-to-int-cast] return (jlong) NULL; ^ An example of a failed log can be seen at: https://buildd.debian.org/status/fetch.php?pkg=netty-tcnative&arch=armhf&ver=1.1.33.Fork10-1&stamp=1447151856 Kurt
--- End Message ---
--- Begin Message ---Source: netty-tcnative Source-Version: 1.1.33.Fork10-2 We believe that the bug you reported is fixed in the latest version of netty-tcnative, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. tony mancill <[email protected]> (supplier of updated netty-tcnative package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Fri, 27 Nov 2015 16:20:29 -0800 Source: netty-tcnative Binary: libnetty-tcnative-java libnetty-tcnative-jni Architecture: source all amd64 Version: 1.1.33.Fork10-2 Distribution: unstable Urgency: medium Maintainer: Debian Java Maintainers <[email protected]> Changed-By: tony mancill <[email protected]> Description: libnetty-tcnative-java - Tomcat native fork for Netty libnetty-tcnative-jni - Tomcat native fork for Netty (JNI library) Closes: 805165 Changes: netty-tcnative (1.1.33.Fork10-2) unstable; urgency=medium . * Team upload. * Drop build-dep on hardening-wrapper. * Add patch for FTBFS on some arches. (Closes: #805165) Checksums-Sha1: c38690c840ddd3d9c7a23e7819879f4202b114d0 2270 netty-tcnative_1.1.33.Fork10-2.dsc b38f1d8958dcaf0022133bb879cefb6e360e057e 5628 netty-tcnative_1.1.33.Fork10-2.debian.tar.xz 61f50c58e58dcc47f0c1a506451a643f4b06df73 64510 libnetty-tcnative-java_1.1.33.Fork10-2_all.deb e686b7e49691a7e47cf9ea337768e68ec7c01d40 50892 libnetty-tcnative-jni_1.1.33.Fork10-2_amd64.deb Checksums-Sha256: 4553b0e51337fb46624d9bf0c32900737ef0068483403e83bc192c298edfe52b 2270 netty-tcnative_1.1.33.Fork10-2.dsc 07be5d3584db7f761b10524376faf51b8567d913b87647dc1c3aaaaa3dd20b1c 5628 netty-tcnative_1.1.33.Fork10-2.debian.tar.xz 8daccadd5de31b807d3a64d03b065c98874362c04afd8635cc60d0217b55cf9b 64510 libnetty-tcnative-java_1.1.33.Fork10-2_all.deb 2dedbe15028dcb6eb27eebb70be2edafbda8ca3c8de3a47a345b5253cb95fbb3 50892 libnetty-tcnative-jni_1.1.33.Fork10-2_amd64.deb Files: d67c67addb75472411842b4325974ce2 2270 java optional netty-tcnative_1.1.33.Fork10-2.dsc e715eeaa35dae1091bef54bd838a9bb9 5628 java optional netty-tcnative_1.1.33.Fork10-2.debian.tar.xz 5c60382aecf92020f70332c916dbae76 64510 java optional libnetty-tcnative-java_1.1.33.Fork10-2_all.deb 6eb34ffb02faffdb03858ae3b9a72490 50892 java optional libnetty-tcnative-jni_1.1.33.Fork10-2_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJWWPTjAAoJECHSBYmXSz6WbbkP/2PJun1eruq8xIB2oo9l2IcF xDQRSggXvJFS39pT3Iyb+Gh6DwJvugIO1q6yOtsIs2x5QVyRBLJo2hNw2MGo0VCf g52/iq6jV9U/Rrfqap7RriX3e8oHEu3Gqz0LRQZgqLgCkrPTXrAF8DyCXWMcJgYg EAlCrj9O7v1ALlU4xDm7tXhhjOAxAcUY3+lM/02+Cbmtuv8wsjPXf5HjZoEJORtY 7ierwETKybpHkAO3auPrSRp4T4os84gf4wROzzvvrCpvUQUTcfT9QOgPmlLl4g6c 0C79ru6KCYWx6OXYoWCPJTm6JjPxtawUCnezE/ZtKO5k0gYjpUC+JnsESeYf6o7z lvCOeXLma0+qktcKjaCud1/aUIsz2g5muxqNIetKHP0eOFqRsWSxMtpX41Ppy2jr rH0SSmwXX9jwwjWJxz4Ttgc2MzxFGeLxvndNoZv3WTKnMEVUpL/b9see9UEWXVJ9 sObjYv6yk9G1u8A75j+kQL7Zy7w4RQ4KrsxmIz1S1w9f2XHj84B6JPhg7hMzmi+p yFVt6CzgyMbGJ2dXZc7Chrlvu5gP4g6rRqyjmCppajCDUj7oTIQHrUOJGvBVbn5X ayh7b9qbRROcS/rkSgyUZgyRX7VHa6v9QH9DO/X1OpMgRCj9iQOS/a29Y8pxJa5r NrjElboip87eL3AI8Dba =LyMw -----END PGP SIGNATURE-----
--- End Message ---

