Étienne Mollier pushed to branch master at Debian Med / qrisk2


Commits:
2738a7d2 by Étienne Mollier at 2024-05-22T09:54:11+02:00
glibc-2.38.patch: new: fix ftbfs with glibc 2.38.

Closes: #1071339

- - - - -
5f519cfd by Étienne Mollier at 2024-05-22T07:55:57+00:00
Update lintian override info format in d/qrisk2.lintian-overrides on line 2.

Changes-By: lintian-brush
Fixes: lintian: mismatched-override
See-also: https://lintian.debian.org/tags/mismatched-override.html

- - - - -
17a33bf8 by Étienne Mollier at 2024-05-22T07:55:57+00:00
Use secure URI in Homepage field.

Changes-By: lintian-brush
Fixes: lintian: homepage-field-uses-insecure-uri
See-also: https://lintian.debian.org/tags/homepage-field-uses-insecure-uri.html

- - - - -
89353545 by Étienne Mollier at 2024-05-22T09:57:30+02:00
Update standards version to 4.7.0, no changes needed.

Changes-By: lintian-brush
Fixes: lintian: out-of-date-standards-version
See-also: https://lintian.debian.org/tags/out-of-date-standards-version.html

- - - - -
f1300993 by Étienne Mollier at 2024-05-22T10:01:01+02:00
ready to upload to unstable.

- - - - -


5 changed files:

- debian/changelog
- debian/control
- + debian/patches/glibc-2.38.patch
- debian/patches/series
- debian/qrisk2.lintian-overrides


Changes:

=====================================
debian/changelog
=====================================
@@ -1,3 +1,13 @@
+qrisk2 (0.1.20150729-6) unstable; urgency=medium
+
+  * Team upload.
+  * glibc-2.38.patch: new: fix ftbfs with glibc 2.38. (Closes: #1071339)
+  * Update lintian override format in d/qrisk2.lintian-overrides on line 2.
+  * Use secure URI in Homepage field.
+  * Update standards version to 4.7.0, no changes needed.
+
+ -- Étienne Mollier <emoll...@debian.org>  Wed, 22 May 2024 09:57:37 +0200
+
 qrisk2 (0.1.20150729-5) unstable; urgency=medium
 
   * Team Upload.


=====================================
debian/control
=====================================
@@ -6,10 +6,10 @@ Section: science
 Priority: optional
 Build-Depends: debhelper-compat (= 13),
                xutils-dev
-Standards-Version: 4.5.0
+Standards-Version: 4.7.0
 Vcs-Browser: https://salsa.debian.org/med-team/qrisk2
 Vcs-Git: https://salsa.debian.org/med-team/qrisk2.git
-Homepage: http://qrisk.org/
+Homepage: https://qrisk.org/
 Rules-Requires-Root: no
 
 Package: qrisk2


=====================================
debian/patches/glibc-2.38.patch
=====================================
@@ -0,0 +1,39 @@
+Description: port to glibc 2.38.
+ The code includes a definition of strlcat that has been introduced in glibc
+ version 2.38.  This definition is clashing with the glibc.  This change
+ plainly erases the definition from upstream source code.
+ .
+ The change would be improved by better detection of the libc level in use.
+ Upstream moved on to qrisk3 which has a different implementation (possibly
+ non-free as far as I could see), hence no forwarding needed, possible, or even
+ suitable.
+
+Author: Étienne Mollier <emoll...@debian.org>
+Bug-Debian: https://bugs.debian.org/1071339
+Forwarded: not-needed
+Last-Update: 2024-05-22
+---
+This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
+--- qrisk2.orig/include/clinrisk/utils.h
++++ qrisk2/include/clinrisk/utils.h
+@@ -38,6 +38,3 @@
+ int is_boolean(int b) ;
+ int d_in_range(double x, double min, double max) ;
+ int i_in_range(int x, int min, int max) ;
+-#ifndef __APPLE__
+-void strlcat(char *dst, char *src, int n) ;
+-#endif
+--- qrisk2.orig/c/utils.c
++++ qrisk2/c/utils.c
+@@ -53,11 +53,3 @@
+ int i_in_range(int x, int min, int max) {
+       return !(x<min || x>max);
+ }
+-
+-#ifndef __APPLE__
+-void strlcat(char *dst, char *src, int n) {
+-        if (strlen(src) + 1 > n - strlen(dst))
+-                strcpy(dst, "errorBuf has been truncated");
+-        (void)strncat(dst, src, n - strlen(dst) - 1);
+-}
+-#endif


=====================================
debian/patches/series
=====================================
@@ -1,3 +1,4 @@
 hardening-flags.patch
 build_on_non-linux_systems.patch
 multiarch-libc.patch
+glibc-2.38.patch


=====================================
debian/qrisk2.lintian-overrides
=====================================
@@ -1,3 +1,3 @@
 # these flags are really used
-qrisk2: hardening-no-fortify-functions usr/bin/Q*_commandLine                  
                                                      
+qrisk2: hardening-no-fortify-functions [usr/bin/Q*_commandLine]
 



View it on GitLab: 
https://salsa.debian.org/med-team/qrisk2/-/compare/8dd8362615ac2761d0375e1dbf38d16457d287a1...f1300993b94399be2d10b3787e4e649865755131

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://salsa.debian.org/med-team/qrisk2/-/compare/8dd8362615ac2761d0375e1dbf38d16457d287a1...f1300993b94399be2d10b3787e4e649865755131
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-med-commit mailing list
debian-med-com...@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-med-commit

Reply via email to