Your message dated Tue, 15 May 2012 22:33:03 +0000
with message-id <[email protected]>
and subject line Bug#671586: fixed in gjacktransport 0.5.2-4
has caused the Debian Bug report #671586,
regarding gjacktransport: FTBFS on hurd-i386.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
671586: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=671586
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: gjacktransport
Severity: important
Tags: patch

Dear Maintainer,

gjacktransport FTBFS on hurd-i386 because it uses PATH_MAX unconditionally. The 
attached patch should fix this issue.

WBR,
Cyril Roelandt.

-- System Information:
Debian Release: wheezy/sid
  APT prefers unreleased
  APT policy: (500, 'unreleased'), (500, 'unstable')
Architecture: hurd-i386 (i686-AT386)

Kernel: GNU-Mach 1.3.99/Hurd-0.3
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash
diff --git a/src/gjack.c b/src/gjack.c
index b7a9026..5915dee 100644
--- a/src/gjack.c
+++ b/src/gjack.c
@@ -16,27 +16,39 @@ extern GtkWidget *window1;
 void dothejack (gboolean onoff);
 
 void status_msg (char *msg) {
-	gchar buf[PATH_MAX];
+	gchar *buf;
 	guint context = 1;
 	GtkWidget *statusbar1;
-	statusbar1=lookup_widget(window1,"statusbar1");
+	size_t size;
 
-	snprintf(buf, PATH_MAX, "%s", msg);
+	statusbar1=lookup_widget(window1,"statusbar1");
+	size = 1+strlen(msg);
+	buf = malloc(size);
+	if (buf == NULL)
+		return;
+	
+	snprintf(buf, size, "%s", msg);
 	gtk_statusbar_pop(GTK_STATUSBAR(statusbar1), context);
 	gtk_statusbar_push(GTK_STATUSBAR(statusbar1), context,  buf);
+	free(buf);
 }
 
 
 void status_printf (const char *format, ...) {
 	va_list arglist;
-	char text[PATH_MAX];
+	char *text;
+	size_t text_size;
 
 	va_start(arglist, format);
-	vsnprintf(text, PATH_MAX, format, arglist);
+	text_size = vsnprintf(NULL, 0, format, arglist);
+	text = malloc(text_size);
+	if (text == NULL)
+		return;
+	vsnprintf(text, text_size, format, arglist);
 	va_end(arglist);
-	text[PATH_MAX -1] =0;
 	
 	status_msg(text);
+	free(text);
 }
 
 /* end status bar */
diff --git a/src/resourceconfig.c b/src/resourceconfig.c
index f63e8f2..6e153d1 100644
--- a/src/resourceconfig.c
+++ b/src/resourceconfig.c
@@ -30,6 +30,10 @@
 # define SYSCFGDIR "/etc"
 #endif
 
+#ifdef __GNU__
+#include <assert.h>
+#endif
+
 #include <stdio.h>
 #include <stdlib.h>
 #include <errno.h>
@@ -116,6 +120,39 @@ void try_load_rc_file (char *filename) {
 }
 
 void load_rc (void) {
+#ifdef __GNU__
+	char *home;
+	char *filename;
+	size_t size, old_size;
+
+	size = strlen(SYSCFGDIR) + strlen(GJACKTRANSPORTRC) + 2;
+	filename = malloc(size);
+	assert(filename);
+	sprintf(filename, "%s/%s", SYSCFGDIR, GJACKTRANSPORTRC);
+	try_load_rc_file(filename);
+
+	home = getenv("HOME");
+	if (home) {
+		old_size = size;
+		size = strlen(home) + strlen(GJACKTRANSPORTRC) + 2;
+		if (old_size < size) {
+			filename = realloc(filename, size);
+			assert(filename);
+		}
+		sprintf(filename, "%s/.%s", home, GJACKTRANSPORTRC);
+		try_load_rc_file(filename);
+	}
+
+	old_size = size;
+	size = strlen(GJACKTRANSPORTRC) + 2;
+	if (old_size < size) {
+		filename = realloc(filename, size);
+		assert(filename);
+	}
+	sprintf(filename, "./%s", GJACKTRANSPORTRC);
+	try_load_rc_file(filename);
+	free(filename);
+#else
 	char *home;
 	char filename[PATH_MAX];
 	if ((strlen(SYSCFGDIR) + strlen(GJACKTRANSPORTRC) + 2) < PATH_MAX) {
@@ -131,6 +168,7 @@ void load_rc (void) {
 		sprintf(filename, "./%s", GJACKTRANSPORTRC);
 		try_load_rc_file(filename);
 	}
+#endif
 }
 
 /* vi:set ts=8 sts=2 sw=2: */ 

--- End Message ---
--- Begin Message ---
Source: gjacktransport
Source-Version: 0.5.2-4

We believe that the bug you reported is fixed in the latest version of
gjacktransport, which is due to be installed in the Debian FTP archive:

gjacktransport_0.5.2-4.debian.tar.gz
  to main/g/gjacktransport/gjacktransport_0.5.2-4.debian.tar.gz
gjacktransport_0.5.2-4.dsc
  to main/g/gjacktransport/gjacktransport_0.5.2-4.dsc
gjacktransport_0.5.2-4_amd64.deb
  to main/g/gjacktransport/gjacktransport_0.5.2-4_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alessio Treglia <[email protected]> (supplier of updated gjacktransport 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 16 May 2012 00:05:44 +0200
Source: gjacktransport
Binary: gjacktransport
Architecture: source amd64
Version: 0.5.2-4
Distribution: unstable
Urgency: low
Maintainer: Debian Multimedia Maintainers 
<[email protected]>
Changed-By: Alessio Treglia <[email protected]>
Description: 
 gjacktransport - access to the JACK's transport mechanism as touchable slider
Closes: 671586
Changes: 
 gjacktransport (0.5.2-4) unstable; urgency=low
 .
   * Add patch to solve FTBFS on the Hurd.
     Thanks to Cyril Roelandt for the report and patch. (Closes: #671586)
   * Compile with --as-needed.
   * Update debian/copyright to the machine-readable format.
   * Bump Standards.
Checksums-Sha1: 
 f933f3b5d5abb541ddc5e84d1da019165de8c0de 2110 gjacktransport_0.5.2-4.dsc
 38ffaa6620d38850081646d1419d2e77042d6172 3570 
gjacktransport_0.5.2-4.debian.tar.gz
 9dc7552ad3a354484a7a4be201d00bda0d985375 65904 gjacktransport_0.5.2-4_amd64.deb
Checksums-Sha256: 
 922e857962a81e8958c4a4f40d0f7876bbb437bbb01c96c269b1d62ce881bef1 2110 
gjacktransport_0.5.2-4.dsc
 0a7c0acb64499d80b9f22ed1bd33b4c12943fd57586711b7bcf9542f5b3f8370 3570 
gjacktransport_0.5.2-4.debian.tar.gz
 82d28d5f0e368564707a51d08e899d3a6122061f012d5eed61553c639abbc87d 65904 
gjacktransport_0.5.2-4_amd64.deb
Files: 
 5d6ad322ceacdc378fcc97b847b286e5 2110 sound optional gjacktransport_0.5.2-4.dsc
 b0f91fda82056911f0c5ac9635cb20ae 3570 sound optional 
gjacktransport_0.5.2-4.debian.tar.gz
 62c106a8247666a3797841af6c4e4cc8 65904 sound optional 
gjacktransport_0.5.2-4_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=DVU2
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to