Your message dated Sat, 21 May 2022 13:04:33 +0000
with message-id <[email protected]>
and subject line Bug#1001337: fixed in pam-p11 0.3.1-1.1
has caused the Debian Bug report #1001337,
regarding pam-p11: FTBFS with openssl 3
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1001337: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001337
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: pam-p11
Version: 0.3.1-1
Severity: serious
Tags: patch experimental
Justification: ftbfs
User: [email protected]
Usertags: origin-ubuntu jammy ubuntu-patch
Hi Eric,
In Ubuntu, pam-p11 is failing to build from source because of the update to
openssl 3, and pam-p11's use of some functions which are now deprecated:
[...]
gcc -DHAVE_CONFIG_H -I. -I.. -Wdate-time -D_FORTIFY_SOURCE=2
-DLOCALEDIR=\"/usr/share/locale\" -DLIBDIR=\"/lib/x86_64-linux-gnu\" -DTEST -g
-O2 -ffile-prefix-map=/<<PKGBUILDDIR>>=. -flto=auto -ffat-lto-objects
-fstack-protector-strong -Wformat -Werror=format-security -Wall -Wextra
-Wno-unused-parameter -Werror -c -o test_login-match_openssh.o `test -f
'match_openssh.c' || echo './'`match_openssh.c
match_openssh.c: In function ‘ssh1_line_to_key’:
match_openssh.c:71:9: error: ‘RSA_new’ is deprecated: Since OpenSSL 3.0
[-Werror=deprecated-declarations]
71 | rsa = RSA_new();
| ^~~
In file included from /usr/include/openssl/x509.h:36,
from match_openssh.c:11:
/usr/include/openssl/rsa.h:201:28: note: declared here
201 | OSSL_DEPRECATEDIN_3_0 RSA *RSA_new(void);
| ^~~~~~~
match_openssh.c:142:9: error: ‘RSA_set0_key’ is deprecated: Since OpenSSL 3.0
[-Werror=deprecated-declarations]
142 | if (!RSA_set0_key(rsa, rsa_n, rsa_e, NULL))
| ^~
In file included from /usr/include/openssl/x509.h:36,
from match_openssh.c:11:
/usr/include/openssl/rsa.h:207:27: note: declared here
207 | OSSL_DEPRECATEDIN_3_0 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e,
BIGNUM *d);
| ^~~~~~~~~~~~
[...]
(https://launchpad.net/ubuntu/+source/pam-p11/0.3.1-1build2/+build/22576460)
OpenSSL 3 is currently only in experimental in Debian, but is expected to be
the version shipped in the next release of Debian.
In Ubuntu, I've applied the following patch to let pam-p11 build by ignoring
the deprecation warnings.
Thanks for considering,
--
Steve Langasek Give me a lever long enough and a Free OS
Debian Developer to set it on, and I can move the world.
Ubuntu Developer https://www.debian.org/
[email protected] [email protected]
diff -Nru pam-p11-0.3.1/debian/rules pam-p11-0.3.1/debian/rules
--- pam-p11-0.3.1/debian/rules 2019-10-27 22:36:24.000000000 -0700
+++ pam-p11-0.3.1/debian/rules 2021-12-08 13:18:20.000000000 -0800
@@ -1,5 +1,7 @@
#!/usr/bin/make -f
+export DEB_CFLAGS_MAINT_APPEND = -Wno-error=deprecated-declarations
+
DEB_HOST_MULTIARCH ?= $(shell dpkg-architecture -qDEB_HOST_MULTIARCH)
%:
--- End Message ---
--- Begin Message ---
Source: pam-p11
Source-Version: 0.3.1-1.1
Done: Bastian Germann <[email protected]>
We believe that the bug you reported is fixed in the latest version of
pam-p11, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Bastian Germann <[email protected]> (supplier of updated pam-p11 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 21 May 2022 14:54:14 +0200
Source: pam-p11
Architecture: source
Version: 0.3.1-1.1
Distribution: unstable
Urgency: low
Maintainer: Debian OpenSC Maintainers <[email protected]>
Changed-By: Bastian Germann <[email protected]>
Closes: 1001337
Changes:
pam-p11 (0.3.1-1.1) unstable; urgency=low
.
* Non-maintainer upload
.
[ Steve Langasek ]
* Build with -Wno-error=deprecated-declarations for compatibility with
OpenSSL 3 (Closes: #1001337)
.
[ Debian Janitor ]
* Use secure copyright file specification URI.
* Set upstream metadata fields: Bug-Database, Bug-Submit, Repository,
Repository-Browse.
Checksums-Sha1:
7a1249c6a05ae2cd7d5528c62e6d5cfbb6f93568 1811 pam-p11_0.3.1-1.1.dsc
33352851ce50e46f325c178989566155edd2a655 3416 pam-p11_0.3.1-1.1.debian.tar.xz
a8b0c81edfa1410a67c98c73318d84f1b2fc3a8b 5754
pam-p11_0.3.1-1.1_source.buildinfo
Checksums-Sha256:
6fd5643a69d259a838c11b5257485429ec0b84526955871219ca93771c4cde1b 1811
pam-p11_0.3.1-1.1.dsc
a6c2bfd3a82a2b011d0ea0cce33ea8064d1bb5b1227d1a1c327042c326f1211e 3416
pam-p11_0.3.1-1.1.debian.tar.xz
780dbc6a2e0161107a1174389e510814996757ddfb30cfa321e25ac243a0eb3f 5754
pam-p11_0.3.1-1.1_source.buildinfo
Files:
76b7069fa91d78e567ab8fbd7ecb1ab9 1811 admin optional pam-p11_0.3.1-1.1.dsc
7862a07d8fe7ec1f8a3dd3abfbac8941 3416 admin optional
pam-p11_0.3.1-1.1.debian.tar.xz
9e90c1b9728d0c16822a555bf28ff2d2 5754 admin optional
pam-p11_0.3.1-1.1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=vNHW
-----END PGP SIGNATURE-----
--- End Message ---