Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package pam_ssh_agent_auth for openSUSE:Factory checked in at 2024-11-08 11:59:46 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/pam_ssh_agent_auth (Old) and /work/SRC/openSUSE:Factory/.pam_ssh_agent_auth.new.2017 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "pam_ssh_agent_auth" Fri Nov 8 11:59:46 2024 rev:3 rq:1222594 version:0.10.4 Changes: -------- --- /work/SRC/openSUSE:Factory/pam_ssh_agent_auth/pam_ssh_agent_auth.changes 2022-01-20 00:13:04.302614874 +0100 +++ /work/SRC/openSUSE:Factory/.pam_ssh_agent_auth.new.2017/pam_ssh_agent_auth.changes 2024-11-08 12:04:09.169408558 +0100 @@ -1,0 +2,26 @@ +Thu Nov 7 20:51:24 UTC 2024 - Scott Bradnick <scott.bradn...@suse.com> + +- Adding the following patches: + * bsd-misc.patch -> address "duplicate __progname" issue + * dot-c.patch -> this is basically '1000-gcc-14.patch' from Debian's patches + for v0.10.3 via udd.debian.org + +------------------------------------------------------------------- +Thu Nov 7 17:11:49 UTC 2024 - Scott Bradnick <scott.bradn...@suse.com> + +- Uncommenting out 'Patch0: gcc14-configure.patch' for factory-auto bot. + +------------------------------------------------------------------- +Thu Nov 7 16:17:27 UTC 2024 - Scott Bradnick <scott.bradn...@suse.com> + +- Adding (disabled) 'gcc14-configure.patch' so gcc14 build issues can be + partially addressed in the future; throws: + "configure: error: *** compiler cannot create working executables, + check config.log ***" + otherwise. + * More info here: + - https://github.com/jbeverly/pam_ssh_agent_auth/issues/45 + - https://github.com/jbeverly/pam_ssh_agent_auth/issues/47 +- Switching over to CC=gcc-13 until gcc14 builds can be fixed + +------------------------------------------------------------------- New: ---- bsd-misc.patch dot-c.patch gcc14-configure.patch BETA DEBUG BEGIN: New:- Adding the following patches: * bsd-misc.patch -> address "duplicate __progname" issue * dot-c.patch -> this is basically '1000-gcc-14.patch' from Debian's patches New: * bsd-misc.patch -> address "duplicate __progname" issue * dot-c.patch -> this is basically '1000-gcc-14.patch' from Debian's patches for v0.10.3 via udd.debian.org New: - Uncommenting out 'Patch0: gcc14-configure.patch' for factory-auto bot. BETA DEBUG END: ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ pam_ssh_agent_auth.spec ++++++ --- /var/tmp/diff_new_pack.oo13lq/_old 2024-11-08 12:04:09.725431763 +0100 +++ /var/tmp/diff_new_pack.oo13lq/_new 2024-11-08 12:04:09.729431930 +0100 @@ -1,7 +1,7 @@ # # spec file for package pam_ssh_agent_auth # -# Copyright (c) 2022 SUSE LLC +# Copyright (c) 2024 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -27,6 +27,12 @@ Group: Development/Tools/Other URL: https://github.com/FlorianFranzen/pam_ssh_agent_auth Source: %{name}-%{version}.tar.gz +### 20241107: having issues compiling with gcc14, but this patch helps +Patch0: gcc14-configure.patch +Patch1: dot-c.patch +Patch2: bsd-misc.patch +#BuildRequires: gcc13 +##### BuildRequires: git-core BuildRequires: openssl-devel BuildRequires: pam-devel @@ -42,8 +48,16 @@ %prep %setup -q -n %{name}-%{version} +### 20241107: for gcc14 +%patch -p1 -P 0 +%patch -P 1 +%patch -P 2 +##### %build +### 20241107: won't be required for gcc14 +#export CC=gcc-13 +##### # 'git submodule init; git submodule update' # required before being tar'd up. %configure \ ++++++ bsd-misc.patch ++++++ --- openbsd-compat/bsd-misc.c.smb 2024-11-07 15:30:13.895388809 -0500 +++ openbsd-compat/bsd-misc.c 2024-11-07 15:31:00.968886365 -0500 @@ -34,9 +34,11 @@ #define UNUSED(expr) do { (void)(expr); } while (0) +/* #ifndef HAVE___PROGNAME char *__progname; #endif +*/ /* * NB. duplicate __progname in case it is an alias for argv[0] ++++++ dot-c.patch ++++++ --- ssh-ecdsa.c.smb 2024-11-07 15:05:17.466835334 -0500 +++ ssh-ecdsa.c 2024-11-07 15:05:53.693628381 -0500 @@ -73,7 +73,7 @@ if (pamsshagentauth_buffer_get_bignum2_ret(&bb, sig->r) == -1 || pamsshagentauth_buffer_get_bignum2_ret(&bb, sig->s) == -1) { #else - DSA_SIG_get0(sig, &r, &s); + DSA_SIG_get0((const DSA_SIG*)sig, (const BIGNUM **)&r, (const BIGNUM **)&s); if (pamsshagentauth_buffer_get_bignum2_ret(&bb, r) == -1 || pamsshagentauth_buffer_get_bignum2_ret(&bb, s) == -1) { #endif --- ssh-rsa.c.smb 2024-11-07 15:06:16.830375761 -0500 +++ ssh-rsa.c 2024-11-07 15:07:30.423965837 -0500 @@ -56,9 +56,9 @@ return -1; } md = EVP_MD_CTX_create(); - EVP_DigestInit(&md, evp_md); - EVP_DigestUpdate(&md, data, datalen); - EVP_DigestFinal(&md, digest, &dlen); + EVP_DigestInit(md, evp_md); + EVP_DigestUpdate(md, data, datalen); + EVP_DigestFinal(md, digest, &dlen); slen = RSA_size(key->rsa); sig = pamsshagentauth_xmalloc(slen); ++++++ gcc14-configure.patch ++++++ diff --git a/configure b/configure index 0090b34..c474757 100755 --- a/configure +++ b/configure @@ -9088,6 +9088,7 @@ else cat confdefs.h - <<_ACEOF >conftest.$ac_ext /* end confdefs.h. */ +#include <stdlib.h> #include <stdio.h> int main(){exit(0);} @@ -9851,6 +9852,7 @@ else cat confdefs.h - <<_ACEOF >conftest.$ac_ext /* end confdefs.h. */ +#include <stdlib.h> #include <sys/types.h> #include <dirent.h> int main(void){struct dirent d;exit(sizeof(d.d_name)<=sizeof(char));} @@ -10386,6 +10388,7 @@ else /* end confdefs.h. */ #include <stdlib.h> +#include <unistd.h> #include <errno.h> int main(){errno=0; setresuid(0,0,0); if (errno==ENOSYS) exit(1); else exit(0);} @@ -10428,6 +10431,7 @@ else /* end confdefs.h. */ #include <stdlib.h> +#include <unistd.h> #include <errno.h> int main(){errno=0; setresgid(0,0,0); if (errno==ENOSYS) exit(1); else exit(0);} @@ -10625,6 +10629,7 @@ else cat confdefs.h - <<_ACEOF >conftest.$ac_ext /* end confdefs.h. */ +#include <stdlib.h> #include <stdio.h> int main(void){char b[5];snprintf(b,5,"123456789");exit(b[4]!='\0');} @@ -10775,6 +10780,7 @@ else /* end confdefs.h. */ #include <stdlib.h> +#include <unistd.h> main() { char template[]="conftest.mkstemp-test"; if (mkstemp(template) == -1) exit(1); @@ -10815,10 +10821,12 @@ else cat confdefs.h - <<_ACEOF >conftest.$ac_ext /* end confdefs.h. */ +#include <stdlib.h> #include <stdio.h> #include <sys/fcntl.h> #include <sys/types.h> #include <sys/wait.h> +#include <pty.h> int main() @@ -11210,6 +11218,7 @@ else cat confdefs.h - <<_ACEOF >conftest.$ac_ext /* end confdefs.h. */ +#include <stdlib.h> #include <stdio.h> #include <string.h> #include <openssl/opensslv.h> @@ -11322,8 +11331,9 @@ else cat confdefs.h - <<_ACEOF >conftest.$ac_ext /* end confdefs.h. */ +#include <stdlib.h> #include <string.h> -#include <openssl/opensslv.h> +#include <openssl/crypto.h> int main(void) { exit(SSLeay() == OPENSSL_VERSION_NUMBER ? 0 : 1); } _ACEOF