Your message dated Mon, 28 Nov 2016 21:10:20 +0000
with message-id <e1cbtbs-0000xf...@fasolo.debian.org>
and subject line Bug#844870: fixed in warzone2100 3.2.1-2
has caused the Debian Bug report #844870,
regarding warzone2100: FTBFS: crc.cpp:338:30: error: invalid conversion from 
'int (*)(const EC_KEY*, unsigned char**) {aka int (*)(const ec_key_st*, 
unsigned char**)}' to 'int (*)(EC_KEY*, unsigned char**) {aka int 
(*)(ec_key_st*, unsigned char**)}' [-fpermissive]
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
844870: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844870
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: warzone2100
Version: 3.2.1-1
Severity: serious
Tags: stretch sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20161118 qa-ftbfs
Justification: FTBFS on amd64

Hi,

During a rebuild of all packages in sid, your package failed to build on
amd64.

Relevant part (hopefully):
> g++ -DHAVE_CONFIG_H -I. -I../..  -DYY_NO_INPUT -D_REENTRANT 
> -I/usr/include/SDL2 -D__STDC_FORMAT_MACROS -D__STDC_LIMIT_MACROS -DNDEBUG 
> -DWZ_DATADIR="\"/usr/share/games/warzone2100\"" 
> -DLOCALEDIR="\"/usr/share/locale\"" -I../.. -I../../3rdparty 
> -I../../3rdparty/glm -I/usr/include/x86_64-linux-gnu/qt5/QtWidgets 
> -I/usr/include/x86_64-linux-gnu/qt5 -I/usr/include/x86_64-linux-gnu/qt5/QtGui 
> -I/usr/include/x86_64-linux-gnu/qt5 
> -I/usr/include/x86_64-linux-gnu/qt5/QtScript 
> -I/usr/include/x86_64-linux-gnu/qt5 
> -I/usr/include/x86_64-linux-gnu/qt5/QtCore 
> -I/usr/include/x86_64-linux-gnu/qt5 -Wdate-time -D_FORTIFY_SOURCE=2 -DNDEBUG 
> -g -Wno-enum-compare -Wall -Wextra -Wno-unused-parameter -Wno-sign-compare 
> -Wcast-align -Wwrite-strings -Wpointer-arith -Wno-format-security 
> -I/usr/include/x86_64-linux-gnu/qt5/QtWidgets 
> -I/usr/include/x86_64-linux-gnu/qt5 -I/usr/include/x86_64-linux-gnu/qt5/QtGui 
> -I/usr/include/x86_64-linux-gnu/qt5 
> -I/usr/include/x86_64-linux-gnu/qt5/QtScript 
> -I/usr/include/x86_64-linux-gnu/qt5 
> -I/usr/include/x86_64-linux-gnu/qt5/QtCore 
> -I/usr/include/x86_64-linux-gnu/qt5 -g -O2 
> -fdebug-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong -Wformat 
> -Werror=format-security -fPIC -std=c++11 -fstack-protector -c -o 
> strres_lexer.o strres_lexer.cpp
> strres_lexer.lpp: In function 'int strres_lex()':
> strres_lexer.lpp:100:56: warning: null argument where non-null required 
> (argument 1) [-Wnonnull]
>  <QUOTE>\n     { strres_error(NULL, "Unexpected end of line in string"); }
>                                                         ^
> crc.cpp: In member function 'EcKey::Key EcKey::toBytes(EcKey::Privacy) const':
> crc.cpp:338:30: error: invalid conversion from 'int (*)(const EC_KEY*, 
> unsigned char**) {aka int (*)(const ec_key_st*, unsigned char**)}' to 'int 
> (*)(EC_KEY*, unsigned char**) {aka int (*)(ec_key_st*, unsigned char**)}' 
> [-fpermissive]
>   case Public:  toBytesFunc = i2o_ECPublicKey;  break;
>                               ^~~~~~~~~~~~~~~
> Makefile:463: recipe for target 'crc.o' failed
> make[5]: *** [crc.o] Error 1

The full build log is available from:
   http://aws-logs.debian.net/2016/11/18/warzone2100_3.2.1-1_unstable.log

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.

--- End Message ---
--- Begin Message ---
Source: warzone2100
Source-Version: 3.2.1-2

We believe that the bug you reported is fixed in the latest version of
warzone2100, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 844...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Markus Koschany <a...@debian.org> (supplier of updated warzone2100 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 28 Nov 2016 20:51:47 +0100
Source: warzone2100
Binary: warzone2100 warzone2100-data warzone2100-music
Architecture: source
Version: 3.2.1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Games Team <pkg-games-de...@lists.alioth.debian.org>
Changed-By: Markus Koschany <a...@debian.org>
Description:
 warzone2100 - 3D real time strategy game
 warzone2100-data - data files for warzone2100
 warzone2100-music - official music for warzone2100
Closes: 844870
Changes:
 warzone2100 (3.2.1-2) unstable; urgency=medium
 .
   * Team upload.
   * Add openssl-1.1.patch and fix FTBFS with OpenSSL 1.1. (Closes: #844870)
   * Fix Lintian warning space-in-std-shortname-in-dep5-copyright.
   * Really use compat level 10.
Checksums-Sha1:
 2be732a77ecfa169219d1da7921e1a69c5ebf878 2759 warzone2100_3.2.1-2.dsc
 668261e7f15deb6556b46269186c1021a97f0a8a 28476 
warzone2100_3.2.1-2.debian.tar.xz
Checksums-Sha256:
 86be86971393f24ce1fc2350167d905143b008eb52c5509521f5a1efcd332968 2759 
warzone2100_3.2.1-2.dsc
 4bef944267e69e9b0e8855fee73f30b2ee6ba6d1396a204d6951afb5a4d270f2 28476 
warzone2100_3.2.1-2.debian.tar.xz
Files:
 a6faaaa2f5aad0a391a5e5b6036a2d4c 2759 games optional warzone2100_3.2.1-2.dsc
 582a0e570e9f4404bcac11923d34d470 28476 games optional 
warzone2100_3.2.1-2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=XgQq
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to