Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package pam_ssh_agent_auth for 
openSUSE:Factory checked in at 2024-11-08 11:59:46
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/pam_ssh_agent_auth (Old)
 and      /work/SRC/openSUSE:Factory/.pam_ssh_agent_auth.new.2017 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "pam_ssh_agent_auth"

Fri Nov  8 11:59:46 2024 rev:3 rq:1222594 version:0.10.4

Changes:
--------
--- /work/SRC/openSUSE:Factory/pam_ssh_agent_auth/pam_ssh_agent_auth.changes    
2022-01-20 00:13:04.302614874 +0100
+++ 
/work/SRC/openSUSE:Factory/.pam_ssh_agent_auth.new.2017/pam_ssh_agent_auth.changes
  2024-11-08 12:04:09.169408558 +0100
@@ -1,0 +2,26 @@
+Thu Nov  7 20:51:24 UTC 2024 - Scott Bradnick <scott.bradn...@suse.com>
+
+- Adding the following patches:
+  * bsd-misc.patch -> address "duplicate __progname" issue
+  * dot-c.patch -> this is basically '1000-gcc-14.patch' from Debian's patches
+    for v0.10.3 via udd.debian.org
+
+-------------------------------------------------------------------
+Thu Nov  7 17:11:49 UTC 2024 - Scott Bradnick <scott.bradn...@suse.com>
+
+- Uncommenting out 'Patch0: gcc14-configure.patch' for factory-auto bot.
+
+-------------------------------------------------------------------
+Thu Nov  7 16:17:27 UTC 2024 - Scott Bradnick <scott.bradn...@suse.com>
+
+- Adding (disabled) 'gcc14-configure.patch' so gcc14 build issues can be
+  partially addressed in the future; throws:
+    "configure: error: *** compiler cannot create working executables, 
+      check config.log ***"
+  otherwise.
+  * More info here:
+    - https://github.com/jbeverly/pam_ssh_agent_auth/issues/45
+    - https://github.com/jbeverly/pam_ssh_agent_auth/issues/47
+- Switching over to CC=gcc-13 until gcc14 builds can be fixed
+
+-------------------------------------------------------------------

New:
----
  bsd-misc.patch
  dot-c.patch
  gcc14-configure.patch

BETA DEBUG BEGIN:
  New:- Adding the following patches:
  * bsd-misc.patch -> address "duplicate __progname" issue
  * dot-c.patch -> this is basically '1000-gcc-14.patch' from Debian's patches
  New:  * bsd-misc.patch -> address "duplicate __progname" issue
  * dot-c.patch -> this is basically '1000-gcc-14.patch' from Debian's patches
    for v0.10.3 via udd.debian.org
  New:
- Uncommenting out 'Patch0: gcc14-configure.patch' for factory-auto bot.
BETA DEBUG END:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ pam_ssh_agent_auth.spec ++++++
--- /var/tmp/diff_new_pack.oo13lq/_old  2024-11-08 12:04:09.725431763 +0100
+++ /var/tmp/diff_new_pack.oo13lq/_new  2024-11-08 12:04:09.729431930 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package pam_ssh_agent_auth
 #
-# Copyright (c) 2022 SUSE LLC
+# Copyright (c) 2024 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -27,6 +27,12 @@
 Group:          Development/Tools/Other
 URL:            https://github.com/FlorianFranzen/pam_ssh_agent_auth
 Source:         %{name}-%{version}.tar.gz
+### 20241107: having issues compiling with gcc14, but this patch helps
+Patch0:         gcc14-configure.patch
+Patch1:         dot-c.patch
+Patch2:         bsd-misc.patch
+#BuildRequires:  gcc13
+#####
 BuildRequires:  git-core
 BuildRequires:  openssl-devel
 BuildRequires:  pam-devel
@@ -42,8 +48,16 @@
 
 %prep
 %setup -q -n %{name}-%{version}
+### 20241107: for gcc14
+%patch -p1 -P 0
+%patch -P 1
+%patch -P 2
+#####
 
 %build
+### 20241107: won't be required for gcc14
+#export CC=gcc-13
+#####
 # 'git submodule init; git submodule update'
 #   required before being tar'd up.
 %configure \

++++++ bsd-misc.patch ++++++
--- openbsd-compat/bsd-misc.c.smb       2024-11-07 15:30:13.895388809 -0500
+++ openbsd-compat/bsd-misc.c   2024-11-07 15:31:00.968886365 -0500
@@ -34,9 +34,11 @@
 
 #define UNUSED(expr) do { (void)(expr); } while (0)
 
+/*
 #ifndef HAVE___PROGNAME
 char *__progname;
 #endif
+*/
 
 /*
  * NB. duplicate __progname in case it is an alias for argv[0]

++++++ dot-c.patch ++++++
--- ssh-ecdsa.c.smb     2024-11-07 15:05:17.466835334 -0500
+++ ssh-ecdsa.c 2024-11-07 15:05:53.693628381 -0500
@@ -73,7 +73,7 @@
     if (pamsshagentauth_buffer_get_bignum2_ret(&bb, sig->r) == -1 ||
         pamsshagentauth_buffer_get_bignum2_ret(&bb, sig->s) == -1) {
 #else
-    DSA_SIG_get0(sig, &r, &s);
+    DSA_SIG_get0((const DSA_SIG*)sig, (const BIGNUM **)&r, (const BIGNUM 
**)&s);
     if (pamsshagentauth_buffer_get_bignum2_ret(&bb, r) == -1 ||
         pamsshagentauth_buffer_get_bignum2_ret(&bb, s) == -1) {
 #endif
--- ssh-rsa.c.smb       2024-11-07 15:06:16.830375761 -0500
+++ ssh-rsa.c   2024-11-07 15:07:30.423965837 -0500
@@ -56,9 +56,9 @@
                return -1;
        }
        md = EVP_MD_CTX_create();
-       EVP_DigestInit(&md, evp_md);
-       EVP_DigestUpdate(&md, data, datalen);
-       EVP_DigestFinal(&md, digest, &dlen);
+       EVP_DigestInit(md, evp_md);
+       EVP_DigestUpdate(md, data, datalen);
+       EVP_DigestFinal(md, digest, &dlen);
 
        slen = RSA_size(key->rsa);
        sig = pamsshagentauth_xmalloc(slen);

++++++ gcc14-configure.patch ++++++
diff --git a/configure b/configure
index 0090b34..c474757 100755
--- a/configure
+++ b/configure
@@ -9088,6 +9088,7 @@ else
   cat confdefs.h - <<_ACEOF >conftest.$ac_ext
 /* end confdefs.h.  */
 
+#include <stdlib.h>
 #include <stdio.h>
 int main(){exit(0);}
 
@@ -9851,6 +9852,7 @@ else
   cat confdefs.h - <<_ACEOF >conftest.$ac_ext
 /* end confdefs.h.  */
 
+#include <stdlib.h>
 #include <sys/types.h>
 #include <dirent.h>
 int main(void){struct dirent d;exit(sizeof(d.d_name)<=sizeof(char));}
@@ -10386,6 +10388,7 @@ else
 /* end confdefs.h.  */
 
 #include <stdlib.h>
+#include <unistd.h>
 #include <errno.h>
 int main(){errno=0; setresuid(0,0,0); if (errno==ENOSYS) exit(1); else 
exit(0);}
 
@@ -10428,6 +10431,7 @@ else
 /* end confdefs.h.  */
 
 #include <stdlib.h>
+#include <unistd.h>
 #include <errno.h>
 int main(){errno=0; setresgid(0,0,0); if (errno==ENOSYS) exit(1); else 
exit(0);}
 
@@ -10625,6 +10629,7 @@ else
   cat confdefs.h - <<_ACEOF >conftest.$ac_ext
 /* end confdefs.h.  */
 
+#include <stdlib.h>
 #include <stdio.h>
 int main(void){char b[5];snprintf(b,5,"123456789");exit(b[4]!='\0');}
 
@@ -10775,6 +10780,7 @@ else
 /* end confdefs.h.  */
 
 #include <stdlib.h>
+#include <unistd.h>
 main() { char template[]="conftest.mkstemp-test";
 if (mkstemp(template) == -1)
        exit(1);
@@ -10815,10 +10821,12 @@ else
   cat confdefs.h - <<_ACEOF >conftest.$ac_ext
 /* end confdefs.h.  */
 
+#include <stdlib.h>
 #include <stdio.h>
 #include <sys/fcntl.h>
 #include <sys/types.h>
 #include <sys/wait.h>
+#include <pty.h>
 
 int
 main()
@@ -11210,6 +11218,7 @@ else
   cat confdefs.h - <<_ACEOF >conftest.$ac_ext
 /* end confdefs.h.  */
 
+#include <stdlib.h>
 #include <stdio.h>
 #include <string.h>
 #include <openssl/opensslv.h>
@@ -11322,8 +11331,9 @@ else
   cat confdefs.h - <<_ACEOF >conftest.$ac_ext
 /* end confdefs.h.  */
 
+#include <stdlib.h>
 #include <string.h>
-#include <openssl/opensslv.h>
+#include <openssl/crypto.h>
 int main(void) { exit(SSLeay() == OPENSSL_VERSION_NUMBER ? 0 : 1); }
 
 _ACEOF

Reply via email to