Your message dated Sat, 23 Mar 2024 15:54:16 +0000 with message-id <[email protected]> and subject line Bug#1066687: fixed in gpw 0.0.19940601-11 has caused the Debian Bug report #1066687, regarding gpw: FTBFS: gpw.c:50:18: error: implicit declaration of function ‘pw_random_number’ [-Werror=implicit-function-declaration] to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 1066687: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066687 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Source: gpw Version: 0.0.19940601-10 Severity: serious Justification: FTBFS Tags: trixie sid ftbfs User: [email protected] Usertags: ftbfs-20240313 ftbfs-trixie ftbfs-impfuncdef Hi, During a rebuild of all packages in sid, your package failed to build on amd64. This is most likely caused by a change in dpkg 1.22.6, that enabled -Werror=implicit-function-declaration. For more information, see https://wiki.debian.org/qa.debian.org/FTBFS#A2024-03-13_-Werror.3Dimplicit-function-declaration Relevant part (hopefully): > cc -Wdate-time -D_FORTIFY_SOURCE=2 -g -O2 > -Werror=implicit-function-declaration -ffile-prefix-map=/<<PKGBUILDDIR>>=. > -fstack-protector-strong -fstack-clash-protection -Wformat > -Werror=format-security -fcf-protection -Wl,-z,relro -g -o gpw.o -c gpw.c > In file included from gpw.c:24: > trigram.h:5:25: warning: overflow in conversion from ‘int’ to ‘short int’ > changes value from ‘67956’ to ‘2420’ [-Woverflow] > 5 | const short sing[26] = {67956, 16446, 33242, 29683, 92097, 11146, > 23682, 20490, 69461, 2080, 9057, 43064, 23656, 59577, 51269, 23100, 1604, > 59717, 95874, 54763, 27214, 8436, 8002, 2312, 13164, 3478}; > | ^~~~~ > trigram.h:5:53: warning: overflow in conversion from ‘int’ to ‘short int’ > changes value from ‘92097’ to ‘26561’ [-Woverflow] > 5 | const short sing[26] = {67956, 16446, 33242, 29683, 92097, 11146, > 23682, 20490, 69461, 2080, 9057, 43064, 23656, 59577, 51269, 23100, 1604, > 59717, 95874, 54763, 27214, 8436, 8002, 2312, 13164, 3478}; > | ^~~~~ > trigram.h:5:81: warning: overflow in conversion from ‘int’ to ‘short int’ > changes value from ‘69461’ to ‘3925’ [-Woverflow] > 5 | const short sing[26] = {67956, 16446, 33242, 29683, 92097, 11146, > 23682, 20490, 69461, 2080, 9057, 43064, 23656, 59577, 51269, 23100, 1604, > 59717, 95874, 54763, 27214, 8436, 8002, 2312, 13164, 3478}; > | > ^~~~~ > trigram.h:5:148: warning: overflow in conversion from ‘int’ to ‘short int’ > changes value from ‘95874’ to ‘30338’ [-Woverflow] > 5 | const short sing[26] = {67956, 16446, 33242, 29683, 92097, 11146, > 23682, 20490, 69461, 2080, 9057, 43064, 23656, 59577, 51269, 23100, 1604, > 59717, 95874, 54763, 27214, 8436, 8002, 2312, 13164, 3478}; > | > > ^~~~~ > gpw.c: In function ‘main’: > gpw.c:50:18: error: implicit declaration of function ‘pw_random_number’ > [-Werror=implicit-function-declaration] > 50 | srand48 (pw_random_number(LONG_MAX)); /* Set random seed. > */ > | ^~~~~~~~~~~~~~~~ > cc1: some warnings being treated as errors > make[2]: *** [debian/Makefile:25: gpw.o] Error 1 The full build log is available from: http://qa-logs.debian.net/2024/03/13/gpw_0.0.19940601-10_unstable.log All bugs filed during this archive rebuild are listed at: https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20240313;[email protected] or: https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20240313&[email protected]&allbugs=1&cseverity=1&ctags=1&caffected=1#results A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! If you reassign this bug to another package, please mark it as 'affects'-ing this package. See https://www.debian.org/Bugs/server-control#affects If you fail to reproduce this, please provide a build log and diff it with mine so that we can identify if something relevant changed in the meantime.
--- End Message ---
--- Begin Message ---Source: gpw Source-Version: 0.0.19940601-11 Done: Francesco Paolo Lovergine <[email protected]> We believe that the bug you reported is fixed in the latest version of gpw, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Francesco Paolo Lovergine <[email protected]> (supplier of updated gpw package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 23 Mar 2024 15:10:53 +0000 Source: gpw Binary: gpw gpw-dbgsym Architecture: source amd64 Version: 0.0.19940601-11 Distribution: unstable Urgency: medium Maintainer: Francesco Paolo Lovergine <[email protected]> Changed-By: Francesco Paolo Lovergine <[email protected]> Description: gpw - Trigraph Password Generator Closes: 1066687 Changes: gpw (0.0.19940601-11) unstable; urgency=medium . * Introduced missing prototype before pw_randon_number() call in randnum patch. (closes: #1066687) * Policy bumped to 4.6.2, no changes needed. Checksums-Sha1: a3008de3c5ca849904649ea90e6502ff45b66543 1779 gpw_0.0.19940601-11.dsc 9eda0135028e337d92a0fbeecf9cb967436f8622 6816 gpw_0.0.19940601-11.debian.tar.xz 72b2e93eee12d2c1fec4408b5eeffcd9f08bf474 7244 gpw-dbgsym_0.0.19940601-11_amd64.deb a6f0d0b6cc763a59ef8aa9a92222e24d43ae117e 6454 gpw_0.0.19940601-11_amd64.buildinfo b73be664197c39f9493d79011f9b8ca5dc104e9c 17348 gpw_0.0.19940601-11_amd64.deb Checksums-Sha256: f144d489e2e7ffec32fd6cd3d2a0b1f40ec9908c82d0a0fc72dded47bce86901 1779 gpw_0.0.19940601-11.dsc 3aa89bb9816f831ac162d1896f2bc6b7c13039f8e972062ff0ff741de452138d 6816 gpw_0.0.19940601-11.debian.tar.xz 5729fa1d55e7c02d8fe7e178b4acc7f7089f2c59c2737304dc3dba20e2f738b4 7244 gpw-dbgsym_0.0.19940601-11_amd64.deb a917c0e0322cac27d8e5324de22ff6003f394f393c07b2e69ce2e201b3e763cd 6454 gpw_0.0.19940601-11_amd64.buildinfo 2d702830b3819a102eb25c8e36ff008452d8efe8fab052d6991d10f30242b5b3 17348 gpw_0.0.19940601-11_amd64.deb Files: ba4b30fc8030c64aa5de41552d7cefc5 1779 utils optional gpw_0.0.19940601-11.dsc ed1708f2ef116d558eceda8cb4d56193 6816 utils optional gpw_0.0.19940601-11.debian.tar.xz 1b77bdcdae0af0704627437f525319cc 7244 debug optional gpw-dbgsym_0.0.19940601-11_amd64.deb 3e2a04ffe7202a1aa6c79f33bd453cc4 6454 utils optional gpw_0.0.19940601-11_amd64.buildinfo dce4bedf4749ff5cac6f4a21e0c0ba30 17348 utils optional gpw_0.0.19940601-11_amd64.deb -----BEGIN PGP SIGNATURE----- iQJHBAEBCgAxFiEEBXmpeiI46/m+Ye0CDwKl4RY2hqQFAmX+8r0THGZyYW5raWVA ZGViaWFuLm9yZwAKCRAPAqXhFjaGpPVxD/kB0t76XpHFItKi/OPo7O64V0qI2Vq1 6Q2VmjPi3TNUb9tJ4U7NhYV0pZSjWLU1HoB5IIoKI7oqh1ux6YajMC5P7hkfMiUm cRn/9li8DY212Dlb4d6Df0uMHC2NC37b8ki7PDnWC1icgvbeqcBhHlDrpe9Zmqrz iqvUmHObiaLcgi7jMeI6TFJp8ys3rj5VWVJE6C7DbJ1ZvwdF3mbwx7Z2QoJVa54P yaxOnvWbvOPm0E48aGf7h6oKNUQJdCSRPGRiTc/zyiH4+hX3GIxdJx91GzfcKSlQ k7wrIp3x59PN5NiM6abFOYAV6qO+D4P/a6nO1oAdpiFyO8U38Sc/0mYTz409gftx kdlqRn3V6g1+dRS135ajnTAgXGgU4/w9WC7O9QkuWTaOtHzdNLHaadO+erT6WYBt G2A8gw8djZP04pkLRM9maD1gOOIS9IReQwkhOGyPl85LQdw1H6LjKhjx6DW3t7iG CKtRSvlD4oxZr4wWx0CEymNNC4OQ+pRLR2kKT4iWcd1rl1wTmKHCNGd2VY7ETdyt 02FyebB3prYCinSYYRCplB3DG/1p3ugflYhjyqiNhsXcDCe08ZID68P3VneJZlLq xrVv7in3cbqwIppZ0DUNbGZjwMH0vByqlbcpESUnvDkJ7jM1+2Bxjah2m6ixGc3v IXlkyccqbuN4Mw== =UHuU -----END PGP SIGNATURE-----
pgpMZRLTntTPR.pgp
Description: PGP signature
--- End Message ---

