Your message dated Sat, 14 May 2022 22:40:23 +0000
with message-id <[email protected]>
and subject line Bug#1006572: fixed in serf 1.3.9-11
has caused the Debian Bug report #1006572,
regarding serf: FTBFS with OpenSSL 3.0
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1006572: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1006572
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: serf
Version: 1.3.9-10
Severity: important
Tags: bookworm sid
User: [email protected]
Usertags: ftbfs-3.0

Your package is failing to build using OpenSSL 3.0 with the
following error:

| buckets/ssl_buckets.c: In function 'ssl_need_client_cert':
| buckets/ssl_buckets.c:1329:24: warning: implicit declaration of function 
'ERR_GET_FUNC'; did you mean 'ERR_GET_LIB'? [-Wimplicit-function-declaration]
|  1329 |                        ERR_GET_FUNC(err),
|       |                        ^~~~~~~~~~~~
|       |                        ERR_GET_LIB
…
| gcc -o libserf-1.so.1.3.0 -Wl,-z,now -Wl,-z,defs -pthread -Wl,-z,relro 
-shared -Wl,-soname=libserf-1.so.1 -Wl,-rpath=/usr/lib/x86_64-linux-gnu 
-Wl,-rpath=/usr/lib/x86_64-linux-gnu -Wl,-rpath=/usr/lib 
-Wl,-rpath=/usr/lib/x86_64-linux-gnu/mit-krb5 context.os incoming.os 
outgoing.os ssltunnel.os buckets/aggregate_buckets.os buckets/allocator.os 
buckets/barrier_buckets.os buckets/buckets.os buckets/bwtp_buckets.os 
buckets/chunk_buckets.os buckets/dechunk_buckets.os buckets/deflate_buckets.os 
buckets/file_buckets.os buckets/headers_buckets.os buckets/iovec_buckets.os 
buckets/limit_buckets.os buckets/mmap_buckets.os buckets/request_buckets.os 
buckets/response_body_buckets.os buckets/response_buckets.os 
buckets/simple_buckets.os buckets/socket_buckets.os buckets/ssl_buckets.os 
auth/auth.os auth/auth_basic.os auth/auth_digest.os auth/auth_spnego.os 
auth/auth_spnego_gss.os auth/auth_spnego_sspi.os -L/usr/lib/x86_64-linux-gnu 
-L/usr/lib -L/usr/lib/x86_64-linux-gnu/mit-krb5 -lssl -lcrypto -lz -lapr-1 
-laprutil-1 -lgssapi_krb5 -lkrb5 -lk5crypto -lcom_err
| /usr/bin/ld: buckets/ssl_buckets.os: in function `ssl_need_client_cert':
| ./buckets/ssl_buckets.c:1328: undefined reference to `ERR_GET_FUNC'
| /usr/bin/ld: ./buckets/ssl_buckets.c:1328: undefined reference to 
`ERR_GET_FUNC'
| collect2: error: ld returned 1 exit status
| scons: *** [libserf-1.so.1.3.0] Error 1

For more information see:
https://www.openssl.org/docs/man3.0/man7/migration_guide.html

Sebastian

--- End Message ---
--- Begin Message ---
Source: serf
Source-Version: 1.3.9-11
Done: James McCoy <[email protected]>

We believe that the bug you reported is fixed in the latest version of
serf, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
James McCoy <[email protected]> (supplier of updated serf package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 14 May 2022 16:57:22 -0400
Source: serf
Architecture: source
Version: 1.3.9-11
Distribution: unstable
Urgency: medium
Maintainer: James McCoy <[email protected]>
Changed-By: James McCoy <[email protected]>
Closes: 1006572 1010043
Changes:
 serf (1.3.9-11) unstable; urgency=medium
 .
   [ James McCoy ]
   * Fix build with OpenSSL 3 (Closes: #1006572)
   * Ignore test failures until upstream fixes their tests with OpenSSL 3
   * Declare compliance with Policy 4.6.1, no changes needed
 .
   [ Simon Chopin ]
   * d/p/bio-ctrl.patch: imported from FreeBSD, fixes TLS issues with OpenSSL3
     (LP: #1956040)
 .
   [ Vagrant Cascadian ]
   * debian/rules: Pass relative path to LIBDIR in dh_auto_install override.
     (Closes: #1010043)
Checksums-Sha1:
 f34132beb2314eb223948501d4970393e0aa1068 2157 serf_1.3.9-11.dsc
 e6b0cf758da8d04745238a1de049589e17d82d92 72992 serf_1.3.9-11.debian.tar.xz
 bf15ff31724b8b5373f7b39dd01c70ef3d76115c 7756 serf_1.3.9-11_amd64.buildinfo
Checksums-Sha256:
 67a9abf26c6fddee8358d671e138369dd58992f19d184fd6b687c213f5ea0595 2157 
serf_1.3.9-11.dsc
 ad021b52dd04241d6af2e8c0dc88e7054d54c97ae4062fd465a86a21b9c7d4e2 72992 
serf_1.3.9-11.debian.tar.xz
 2561fb51e7a33d67c3438506d4bff6870480aa54f14d4905769bca99bca5558e 7756 
serf_1.3.9-11_amd64.buildinfo
Files:
 00a9e3276d768c1c9fb9b816a5801164 2157 libs optional serf_1.3.9-11.dsc
 ed8c05fe476413f8dbb2a13765d86365 72992 libs optional 
serf_1.3.9-11.debian.tar.xz
 0ee496a79fe48e878d3dc976e062925f 7756 libs optional 
serf_1.3.9-11_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=MAM9
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to