I am uploading a NMU to DELAYED/10 in order to fix this.
Please find the debdiff attached.
diff -Nru komi-1.04/Makefile komi-1.04/Makefile
--- komi-1.04/Makefile 2024-02-21 12:50:34.000000000 +0000
+++ komi-1.04/Makefile 2004-07-14 21:48:52.000000000 +0000
@@ -11,9 +11,9 @@
MANPATH=/usr/local/man/man6/
MIXER=-lSDL_mixer
-SDL_LIB=$(shell sdl-config --libs) $(MIXER)
+SDL_LIB=$(shell sdl-config --static-libs) $(MIXER)
-CFLAGS=-Wall -pedantic -std=c99 -g $(OPT) \
+CFLAGS=-Wall -pedantic -std=c99 -O2 \
$(shell sdl-config --cflags) \
-DDATAPATH=\"$(DATAPATH)\"
diff -Nru komi-1.04/debian/changelog komi-1.04/debian/changelog
--- komi-1.04/debian/changelog 2024-02-21 12:50:34.000000000 +0000
+++ komi-1.04/debian/changelog 2024-02-21 12:38:22.000000000 +0000
@@ -1,3 +1,14 @@
+komi (1.04-5.1) unstable; urgency=medium
+
+ * Non-maintainer upload
+ * Convert to source format 3.0 (Closes: #1007427)
+ * d/copyright: Convert to machine-readable format.
+
+ [ Helmut Grohne ]
+ * Fix FTCBFS: Let dh_auto_build pass cross tools to make. (Closes: #956023)
+
+ -- Bastian Germann <[email protected]> Wed, 21 Feb 2024 12:38:22 +0000
+
komi (1.04-5) unstable; urgency=low
* Fixed problem in Makefile that caused komi to link against many libraries
diff -Nru komi-1.04/debian/copyright komi-1.04/debian/copyright
--- komi-1.04/debian/copyright 2024-02-21 12:50:34.000000000 +0000
+++ komi-1.04/debian/copyright 2024-02-21 12:38:22.000000000 +0000
@@ -1,25 +1,29 @@
-This package was debianized by Steve Kemp <[email protected]> on
-Sat, 9 Aug 2003 19:35:43 +0100.
-
-It was downloaded from http://komi.sourceforge.net/
-
-Upstream Author: The upstream author for Komi is Allan Crossman
-
-Copyright (C) 2004 Allan Crossman
-
-This program is free software; you can redistribute it and/or
-modify it under the terms of the GNU General Public License
-as published by the Free Software Foundation; either version 2
-of the License, or (at your option) any later version.
-
-This program is distributed in the hope that it will be useful,
-but WITHOUT ANY WARRANTY; without even the implied warranty of
-MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-GNU General Public License for more details.
-
-You should have received a copy of the GNU General Public License
-along with this program; if not, write to the Free Software
-Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
-
-The complete text of the GNU General Public License can be found
-in /usr/share/common-licenses/GPL-2 file.
+Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
+Upstream-Name: Komi
+Comment:
+ This package was debianized by Steve Kemp <[email protected]> on
+ Sat, 9 Aug 2003 19:35:43 +0100.
+Source:
+ http://komi.sourceforge.net/
+Upstream-Contact:
+ Allan Crossman <[email protected]>
+
+Files: *
+Copyright: (C) 2004 Allan Crossman
+License: GPL-2+
+ This program is free software; you can redistribute it and/or
+ modify it under the terms of the GNU General Public License
+ as published by the Free Software Foundation; either version 2
+ of the License, or (at your option) any later version.
+ .
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+ .
+ You should have received a copy of the GNU General Public License
+ along with this program; if not, write to the Free Software
+ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301,
USA.
+Comment:
+ The complete text of the GNU General Public License can be found
+ in /usr/share/common-licenses/GPL-2 file.
diff -Nru komi-1.04/debian/patches/debian.patch
komi-1.04/debian/patches/debian.patch
--- komi-1.04/debian/patches/debian.patch 1970-01-01 00:00:00.000000000
+0000
+++ komi-1.04/debian/patches/debian.patch 2024-02-21 12:38:22.000000000
+0000
@@ -0,0 +1,142 @@
+--- komi-1.04.orig/Makefile
++++ komi-1.04/Makefile
+@@ -11,9 +11,9 @@ BINPATH=/usr/local/bin/
+ MANPATH=/usr/local/man/man6/
+
+ MIXER=-lSDL_mixer
+-SDL_LIB=$(shell sdl-config --static-libs) $(MIXER)
++SDL_LIB=$(shell sdl-config --libs) $(MIXER)
+
+-CFLAGS=-Wall -pedantic -std=c99 -O2 \
++CFLAGS=-Wall -pedantic -std=c99 -g $(OPT) \
+ $(shell sdl-config --cflags) \
+ -DDATAPATH=\"$(DATAPATH)\"
+
+--- komi-1.04.orig/komi.6
++++ komi-1.04/komi.6
+@@ -48,7 +48,6 @@ Run the game in fullscreen mode, rather
+
+ .TP
+ \fB\-\-nosound\fR
+-.Sp
+ Disable all sound effects.
+
+ .TP
+--- komi-1.04.orig/komi.c
++++ komi-1.04/komi.c
+@@ -242,6 +242,8 @@ void menu (void)
+ {
+ keymap.escape = 0; // So we don't respond to escape pressed in
game.
+ mousemap.button = 0; // Likewise for the mouse.
++ keymap.fire1 = 0; // Neither fire keys are likely to be down from
game,
++ keymap.fire2 = 0; // but could be.
+
+ manageevents();
+
+@@ -297,6 +299,17 @@ void menu (void)
+ {
+ cleanexit(0);
+ }
++
++ if (keymap.fire1 || keymap.fire2)
++ {
++ keymap.fire1 = keymap.fire2 = 0;
++ SDL_ShowCursor(SDL_DISABLE);
++ game();
++ SDL_ShowCursor(SDL_ENABLE);
++ setmaintitlebar();
++ drawmenu(highlight_start, highlight_quit, highlight_shuffle);
++ }
++
+ if (mousemap.button)
+ {
+ if (abs(mousemap.clickx - STARTBUTTON_X) < start_title.pixelmap->w /
2 && abs(mousemap.clicky - STARTBUTTON_Y) < start_title.pixelmap->h / 2)
+@@ -420,7 +433,7 @@ int playlevel (void)
+ SDL_UpdateRect(virtue, 0, 0, 0, 0);
+ updatetitlebar();
+
+- if (lives == 1 && givelastlifewarning && fullscreen)
++ if (lives == 1 && givelastlifewarning)
+ {
+ playsound(lastlife_sound);
+ givelastlifewarning = 0;
+@@ -2875,8 +2888,10 @@ void loadsound(Mix_Chunk ** thesound, ch
+ if (strlen(directory) + strlen(filename) >= sizeof(fullpath)) // Check
for buffer overflow on fullpath
+ {
+ fprintf(stderr, "Fatal error while loading %s:\n", filename);
+- fprintf(stderr, "Size of directory name (%d chars) plus size of file
name (%d chars)\n", strlen(directory), strlen(filename));
+- fprintf(stderr, "is too long (over %d chars), and would cause a buffer
overflow...\n", sizeof(fullpath) - 1);
++ fprintf(stderr, "Size of directory name (%u chars) plus size of file
name (%u chars)\n",
++ (unsigned int) strlen(directory), (unsigned int)
strlen(filename));
++ fprintf(stderr, "is too long (over %u chars), and would cause a buffer
overflow...\n",
++ (unsigned int) (sizeof(fullpath) - 1));
+ cleanexit(1);
+ }
+ strcpy(fullpath, directory);
+@@ -3276,8 +3291,10 @@ void screenshot (SDL_Surface * surface,
+ if (strlen(directory) + strlen(filename) >= sizeof(fullpath)) // Check
for buffer overflow on fullpath
+ {
+ fprintf(stderr, "Error while saving %s:\n", filename);
+- fprintf(stderr, "Size of directory name (%d chars) plus size of file
name (%d chars)\n", strlen(directory), strlen(filename));
+- fprintf(stderr, "is too long (over %d chars), and would cause a buffer
overflow...\n", sizeof(fullpath) - 1);
++ fprintf(stderr, "Size of directory name (%u chars) plus size of file
name (%u chars)\n",
++ (unsigned int) strlen(directory), (unsigned int)
strlen(filename));
++ fprintf(stderr, "is too long (over %u chars), and would cause a buffer
overflow...\n",
++ (unsigned int) (sizeof(fullpath) - 1));
+ return;
+ }
+ strcpy(fullpath, directory);
+@@ -3625,8 +3642,10 @@ void saveprefs (char * directory, char *
+ if (strlen(directory) + strlen(filename) >= sizeof(fullpath)) // Check
for buffer overflow on fullpath
+ {
+ fprintf(stderr, "Error while saving %s:\n", filename);
+- fprintf(stderr, "Size of directory name (%d chars) plus size of file
name (%d chars)\n", strlen(directory), strlen(filename));
+- fprintf(stderr, "is too long (over %d chars), and would cause a buffer
overflow...\n", sizeof(fullpath) - 1);
++ fprintf(stderr, "Size of directory name (%u chars) plus size of file
name (%u chars)\n",
++ (unsigned int) strlen(directory), (unsigned int)
strlen(filename));
++ fprintf(stderr, "is too long (over %u chars), and would cause a buffer
overflow...\n",
++ (unsigned int) (sizeof(fullpath) - 1));
+ return;
+ }
+ strcpy(fullpath, directory);
+@@ -3662,8 +3681,10 @@ void loadprefs (char * directory, char *
+ if (strlen(directory) + strlen(filename) >= sizeof(fullpath)) // Check
for buffer overflow on fullpath
+ {
+ fprintf(stderr, "Error while loading %s:\n", filename);
+- fprintf(stderr, "Size of directory name (%d chars) plus size of file
name (%d chars)\n", strlen(directory), strlen(filename));
+- fprintf(stderr, "is too long (over %d chars), and would cause a buffer
overflow...\n", sizeof(fullpath) - 1);
++ fprintf(stderr, "Size of directory name (%u chars) plus size of file
name (%u chars)\n",
++ (unsigned int) strlen(directory), (unsigned int)
strlen(filename));
++ fprintf(stderr, "is too long (over %u chars), and would cause a buffer
overflow...\n",
++ (unsigned int) (sizeof(fullpath) - 1));
+ return;
+ }
+ strcpy(fullpath, directory);
+@@ -3740,8 +3761,10 @@ int playmusic (char * directory, char *
+ if (strlen(directory) + strlen(filename) >= sizeof(fullpath)) // Check
for buffer overflow on fullpath
+ {
+ fprintf(stderr, "Error while loading %s:\n", filename);
+- fprintf(stderr, "Size of directory name (%d chars) plus size of file
name (%d chars)\n", strlen(directory), strlen(filename));
+- fprintf(stderr, "is too long (over %d chars), and would cause a buffer
overflow...\n", sizeof(fullpath) - 1);
++ fprintf(stderr, "Size of directory name (%u chars) plus size of file
name (%u chars)\n",
++ (unsigned int) strlen(directory), (unsigned int)
strlen(filename));
++ fprintf(stderr, "is too long (over %u chars), and would cause a buffer
overflow...\n",
++ (unsigned int) (sizeof(fullpath) - 1));
+ return 1;
+ }
+ strcpy(fullpath, directory);
+--- komi-1.04.orig/sprites.h
++++ komi-1.04/sprites.h
+@@ -146,8 +146,10 @@ void loadsprite (struct sprite_struct *
+ if (strlen(directory) + strlen(filename) >= sizeof(fullpath)) // Check
for buffer overflow on fullpath
+ {
+ fprintf(stderr, "Fatal error while loading %s:\n", filename);
+- fprintf(stderr, "Size of directory name (%d chars) plus size of file
name (%d chars)\n", strlen(directory), strlen(filename));
+- fprintf(stderr, "is too long (over %d chars), and would cause a buffer
overflow...\n", sizeof(fullpath) - 1);
++ fprintf(stderr, "Size of directory name (%u chars) plus size of file
name (%u chars)\n",
++ (unsigned int) strlen(directory), (unsigned int)
strlen(filename));
++ fprintf(stderr, "is too long (over %u chars), and would cause a buffer
overflow...\n",
++ (unsigned int) (sizeof(fullpath) - 1));
+ cleanexit(1);
+ }
+ strcpy(fullpath, directory);
diff -Nru komi-1.04/debian/patches/series komi-1.04/debian/patches/series
--- komi-1.04/debian/patches/series 1970-01-01 00:00:00.000000000 +0000
+++ komi-1.04/debian/patches/series 2024-02-21 12:38:22.000000000 +0000
@@ -0,0 +1 @@
+debian.patch
diff -Nru komi-1.04/debian/rules komi-1.04/debian/rules
--- komi-1.04/debian/rules 2024-02-21 12:50:34.000000000 +0000
+++ komi-1.04/debian/rules 2024-02-21 12:38:22.000000000 +0000
@@ -21,7 +21,7 @@
# Compile package
build-stamp:
dh_testdir
- $(MAKE) DATAPATH=/usr/share/games/komi/ OPT="$(OPT)"
+ dh_auto_build -- DATAPATH=/usr/share/games/komi/ OPT="$(OPT)"
touch build-stamp
build-indep:
diff -Nru komi-1.04/debian/source/format komi-1.04/debian/source/format
--- komi-1.04/debian/source/format 2024-02-21 12:50:34.000000000 +0000
+++ komi-1.04/debian/source/format 2024-02-21 12:37:52.000000000 +0000
@@ -1 +1 @@
-1.0
+3.0 (quilt)
diff -Nru komi-1.04/komi.6 komi-1.04/komi.6
--- komi-1.04/komi.6 2024-02-21 12:50:34.000000000 +0000
+++ komi-1.04/komi.6 2004-07-14 21:48:52.000000000 +0000
@@ -48,6 +48,7 @@
.TP
\fB\-\-nosound\fR
+.Sp
Disable all sound effects.
.TP
diff -Nru komi-1.04/komi.c komi-1.04/komi.c
--- komi-1.04/komi.c 2024-02-21 12:50:34.000000000 +0000
+++ komi-1.04/komi.c 2004-08-09 20:07:21.000000000 +0000
@@ -242,8 +242,6 @@
{
keymap.escape = 0; // So we don't respond to escape pressed in game.
mousemap.button = 0; // Likewise for the mouse.
- keymap.fire1 = 0; // Neither fire keys are likely to be down from
game,
- keymap.fire2 = 0; // but could be.
manageevents();
@@ -299,17 +297,6 @@
{
cleanexit(0);
}
-
- if (keymap.fire1 || keymap.fire2)
- {
- keymap.fire1 = keymap.fire2 = 0;
- SDL_ShowCursor(SDL_DISABLE);
- game();
- SDL_ShowCursor(SDL_ENABLE);
- setmaintitlebar();
- drawmenu(highlight_start, highlight_quit, highlight_shuffle);
- }
-
if (mousemap.button)
{
if (abs(mousemap.clickx - STARTBUTTON_X) < start_title.pixelmap->w /
2 && abs(mousemap.clicky - STARTBUTTON_Y) < start_title.pixelmap->h / 2)
@@ -433,7 +420,7 @@
SDL_UpdateRect(virtue, 0, 0, 0, 0);
updatetitlebar();
- if (lives == 1 && givelastlifewarning)
+ if (lives == 1 && givelastlifewarning && fullscreen)
{
playsound(lastlife_sound);
givelastlifewarning = 0;
@@ -2888,10 +2875,8 @@
if (strlen(directory) + strlen(filename) >= sizeof(fullpath)) // Check
for buffer overflow on fullpath
{
fprintf(stderr, "Fatal error while loading %s:\n", filename);
- fprintf(stderr, "Size of directory name (%u chars) plus size of file
name (%u chars)\n",
- (unsigned int) strlen(directory), (unsigned int)
strlen(filename));
- fprintf(stderr, "is too long (over %u chars), and would cause a buffer
overflow...\n",
- (unsigned int) (sizeof(fullpath) - 1));
+ fprintf(stderr, "Size of directory name (%d chars) plus size of file
name (%d chars)\n", strlen(directory), strlen(filename));
+ fprintf(stderr, "is too long (over %d chars), and would cause a buffer
overflow...\n", sizeof(fullpath) - 1);
cleanexit(1);
}
strcpy(fullpath, directory);
@@ -3291,10 +3276,8 @@
if (strlen(directory) + strlen(filename) >= sizeof(fullpath)) // Check
for buffer overflow on fullpath
{
fprintf(stderr, "Error while saving %s:\n", filename);
- fprintf(stderr, "Size of directory name (%u chars) plus size of file
name (%u chars)\n",
- (unsigned int) strlen(directory), (unsigned int)
strlen(filename));
- fprintf(stderr, "is too long (over %u chars), and would cause a buffer
overflow...\n",
- (unsigned int) (sizeof(fullpath) - 1));
+ fprintf(stderr, "Size of directory name (%d chars) plus size of file
name (%d chars)\n", strlen(directory), strlen(filename));
+ fprintf(stderr, "is too long (over %d chars), and would cause a buffer
overflow...\n", sizeof(fullpath) - 1);
return;
}
strcpy(fullpath, directory);
@@ -3642,10 +3625,8 @@
if (strlen(directory) + strlen(filename) >= sizeof(fullpath)) // Check
for buffer overflow on fullpath
{
fprintf(stderr, "Error while saving %s:\n", filename);
- fprintf(stderr, "Size of directory name (%u chars) plus size of file
name (%u chars)\n",
- (unsigned int) strlen(directory), (unsigned int)
strlen(filename));
- fprintf(stderr, "is too long (over %u chars), and would cause a buffer
overflow...\n",
- (unsigned int) (sizeof(fullpath) - 1));
+ fprintf(stderr, "Size of directory name (%d chars) plus size of file
name (%d chars)\n", strlen(directory), strlen(filename));
+ fprintf(stderr, "is too long (over %d chars), and would cause a buffer
overflow...\n", sizeof(fullpath) - 1);
return;
}
strcpy(fullpath, directory);
@@ -3681,10 +3662,8 @@
if (strlen(directory) + strlen(filename) >= sizeof(fullpath)) // Check
for buffer overflow on fullpath
{
fprintf(stderr, "Error while loading %s:\n", filename);
- fprintf(stderr, "Size of directory name (%u chars) plus size of file
name (%u chars)\n",
- (unsigned int) strlen(directory), (unsigned int)
strlen(filename));
- fprintf(stderr, "is too long (over %u chars), and would cause a buffer
overflow...\n",
- (unsigned int) (sizeof(fullpath) - 1));
+ fprintf(stderr, "Size of directory name (%d chars) plus size of file
name (%d chars)\n", strlen(directory), strlen(filename));
+ fprintf(stderr, "is too long (over %d chars), and would cause a buffer
overflow...\n", sizeof(fullpath) - 1);
return;
}
strcpy(fullpath, directory);
@@ -3761,10 +3740,8 @@
if (strlen(directory) + strlen(filename) >= sizeof(fullpath)) // Check
for buffer overflow on fullpath
{
fprintf(stderr, "Error while loading %s:\n", filename);
- fprintf(stderr, "Size of directory name (%u chars) plus size of file
name (%u chars)\n",
- (unsigned int) strlen(directory), (unsigned int)
strlen(filename));
- fprintf(stderr, "is too long (over %u chars), and would cause a buffer
overflow...\n",
- (unsigned int) (sizeof(fullpath) - 1));
+ fprintf(stderr, "Size of directory name (%d chars) plus size of file
name (%d chars)\n", strlen(directory), strlen(filename));
+ fprintf(stderr, "is too long (over %d chars), and would cause a buffer
overflow...\n", sizeof(fullpath) - 1);
return 1;
}
strcpy(fullpath, directory);
diff -Nru komi-1.04/sprites.h komi-1.04/sprites.h
--- komi-1.04/sprites.h 2024-02-21 12:50:34.000000000 +0000
+++ komi-1.04/sprites.h 2004-07-14 21:48:52.000000000 +0000
@@ -146,10 +146,8 @@
if (strlen(directory) + strlen(filename) >= sizeof(fullpath)) // Check
for buffer overflow on fullpath
{
fprintf(stderr, "Fatal error while loading %s:\n", filename);
- fprintf(stderr, "Size of directory name (%u chars) plus size of file
name (%u chars)\n",
- (unsigned int) strlen(directory), (unsigned int)
strlen(filename));
- fprintf(stderr, "is too long (over %u chars), and would cause a buffer
overflow...\n",
- (unsigned int) (sizeof(fullpath) - 1));
+ fprintf(stderr, "Size of directory name (%d chars) plus size of file
name (%d chars)\n", strlen(directory), strlen(filename));
+ fprintf(stderr, "is too long (over %d chars), and would cause a buffer
overflow...\n", sizeof(fullpath) - 1);
cleanexit(1);
}
strcpy(fullpath, directory);