Your message dated Sat, 03 Mar 2018 15:52:25 +0000
with message-id <[email protected]>
and subject line Bug#882549: fixed in nim 0.18.0-1
has caused the Debian Bug report #882549,
regarding nim: Please migrate to openssl1.1 in Buster
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
882549: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882549
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: nim
Version: 0.17.2-1
Severity: serious
Tags: sid buster
User: [email protected]
Usertags: openssl-1.1-trans
Control: block 871056 by -1
Please migrate to libssl-dev in the Buster cycle. I am very sorry for
this late report but this package was never on my list. It slipped
because it never B-D on libssl1.0-dev.
I looked at the package and the easy build fix is to add the 1.1 prefix
to the libs it looks (in lib/wrappers/openssl.nim). The way it is now,
the package (nimble binary) should not work if libssl-dev is installed
because it parses the .so versions from left to right and first one is
empty. So there is this which already should affect Stretch.
There are a lot of defines and function names copied from the openssl's
header files. Someone needs to double check those that there still the
same.
Function wise:
SSL_library_init() and a few other macros towards "OPENSSL_init_ssl(0, NULL)"
so "normal" C will work but if nim is accessing the functions directly
then it will fail.
SSLv23_client_method() and friends are also macros. If I read this right
then if it is not available, then it will invoke TLSv1_method(). This
will work in 1.1 but please don't do this. The problem with
TLSv1_method() is that it will give you _only_ TLSv1 and _never_
TLSv1.1, and/or TLSv1.2 like SSLv23_client_method(). The "v23" functions
should be around (for 1.0.2 and earlier) and for 1.1 you would to use
TLS_client_method().
The v2 and v3 (and the TLSv1) could be disabled at build time. If you
want to exclude a certain TLS version you should use something like
SSL_OP_NO_TLSv1 to disable TLSv1 only (and keep other version like
v1.1 and v1.2 around).
Data strucures. All structures are opaque and you need to tell libssl to
allocate it and free it. This means you can't have them on stack or
dereference them. It seems that md5_* (md5_File) uses them on Stack.
A larger collection of what changed in OpenSSL 1.0.2->1.1 is at
https://wiki.openssl.org/index.php/OpenSSL_1.1.0_Changes
Sebastian
--- End Message ---
--- Begin Message ---
Source: nim
Source-Version: 0.18.0-1
We believe that the bug you reported is fixed in the latest version of
nim, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Federico Ceratto <[email protected]> (supplier of updated nim package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 03 Mar 2018 14:38:45 +0000
Source: nim
Binary: nim nim-doc
Architecture: source
Version: 0.18.0-1
Distribution: unstable
Urgency: medium
Maintainer: Federico Ceratto <[email protected]>
Changed-By: Federico Ceratto <[email protected]>
Description:
nim - Nim programming language - compiler
nim-doc - Nim programming language - documentation
Closes: 876526 882549
Changes:
nim (0.18.0-1) unstable; urgency=medium
.
* New upstream release
* Switch to libssl1.1 (Closes: #882549)
* Remove mips64el target (Closes: #876526)
* Move packaging VCS to Salsa
Checksums-Sha1:
f0140ae2923c4ceead032b993885230a36982853 1976 nim_0.18.0-1.dsc
93d938927bff7db2bc50a9300c4b0b92d9cd5894 30470668 nim_0.18.0.orig.tar.xz
f53d8a0cc3440744b13611ccc8d51dfd274ca1e5 9604 nim_0.18.0-1.debian.tar.xz
302e6c14a6acf53882041bc87926d583f06b0f52 5901 nim_0.18.0-1_amd64.buildinfo
Checksums-Sha256:
9acb2f31ee0d94741be8780e2d4ca701e346a8651ca0e5d518a6927522756eef 1976
nim_0.18.0-1.dsc
0058fb04dc6c3f7015686990c97f28cb88cc5d882aff800979107881cc8cc359 30470668
nim_0.18.0.orig.tar.xz
3b629db84ccb8b36276c80aaa1a0f3167c77e6d60557956b310074853ea783e6 9604
nim_0.18.0-1.debian.tar.xz
5fef09ebcabe5e48fe4cdf3a718568e6c2377a40bbd2839a11ac34a93087ddf0 5901
nim_0.18.0-1_amd64.buildinfo
Files:
34b121697859ceadd5a43f334942bc18 1976 devel optional nim_0.18.0-1.dsc
d8af1fe0e7db0c604ebb466a7aed21e1 30470668 devel optional nim_0.18.0.orig.tar.xz
f3ae6ef179f2e5c08153a97bc2af6e88 9604 devel optional nim_0.18.0-1.debian.tar.xz
6fef12065ac09544bdc79f76538925c4 5901 devel optional
nim_0.18.0-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=//9T
-----END PGP SIGNATURE-----
--- End Message ---