Your message dated Mon, 07 Oct 2019 15:50:27 +0000
with message-id <[email protected]>
and subject line Bug#941915: fixed in libwww-curl-perl 4.17-6
has caused the Debian Bug report #941915,
regarding FTBFS: expected '{' before 'void' in 'struct void *curlm;'
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
941915: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941915
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: libwww-curl-perl
Version: 4.17-5
Severity: serious
Tags: upstream patch ftbfs
Justification: fails to build from source (but built successfully in the past)

As seen on [1], libwww-curl-perl fails to build in current unstable. Currently 
this impedes the perl transition to 5.30.

x86_64-linux-gnu-gcc -c  -I/usr/include/x86_64-linux-gnu -D_REENTRANT 
-D_GNU_SOURCE -DDEBIAN -fwrapv -fno-strict-aliasing -pipe -I/usr/local/include 
-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -g -O2 
-fdebug-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong -Wformat 
-Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2   -DVERSION=\"4.17\" 
-DXS_VERSION=\"4.17\" -fPIC "-I/usr/lib/x86_64-linux-gnu/perl/5.30/CORE"   
Curl.c
Curl.xs:76:12: error: expected ‘{’ before ‘void’
   76 |     struct void *curlm;
      |            ^~~~

The reasons seems to be that 'CURL' is defined as 'void' and 'struct CURL' is 
no longer a valid type.

The patch below seems to fix the build.

I won't be able to upload a fixed package until tomorrow, so if somebody else 
from the group has the time - please go ahead.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
--- a/Curl.xs
+++ b/Curl.xs
@@ -47,7 +47,7 @@ typedef enum {
 
 typedef struct {
     /* The main curl handle */
-    struct CURL *curl;
+    CURL *curl;
     I32 *y;
     /* Lists that can be set via curl_easy_setopt() */
     struct curl_slist *slist[SLIST_LAST];
@@ -73,7 +73,7 @@ typedef struct {
 #ifdef __CURL_MULTI_H
     struct CURLM *curlm;
 #else
-    struct void *curlm;
+    void *curlm;
 #endif
 } perl_curl_multi;
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

[1] 
https://buildd.debian.org/status/fetch.php?pkg=libwww-curl-perl&arch=amd64&ver=4.17-5%2Bb1&stamp=1570325845&raw=0

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'oldoldstable'), (500, 
'unstable'), (500, 'oldstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.2.0-3-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=bg_BG.UTF-8, LC_CTYPE=bg_BG.UTF-8 (charmap=UTF-8), 
LANGUAGE=bg_BG.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages libwww-curl-perl depends on:
ii  libc6                       2.29-2
ii  libcurl3-gnutls             7.66.0-1
ii  perl                        5.30.0-5
ii  perl-base [perlapi-5.30.0]  5.30.0-5

libwww-curl-perl recommends no packages.

Versions of packages libwww-curl-perl suggests:
pn  libcurl4-gnutls-dev  <none>

-- debconf-show failed

--- End Message ---
--- Begin Message ---
Source: libwww-curl-perl
Source-Version: 4.17-6

We believe that the bug you reported is fixed in the latest version of
libwww-curl-perl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
gregor herrmann <[email protected]> (supplier of updated libwww-curl-perl 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon,  7 Oct 2019 17:11:49 CEST
Source: libwww-curl-perl
Binary: 
Architecture: source
Version: 4.17-6
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group <[email protected]>
Changed-By: gregor herrmann <[email protected]>
Description: 
Closes: 941915
Changes:
 libwww-curl-perl (4.17-6) unstable; urgency=medium
 .
   * Add patch from CPAN RT for libcurl 7.66.0 compatibility.
     (Closes: #941915)
   * Annotate test-only build dependencies with <!nocheck>.
   * Declare compliance with Debian Policy 4.4.1.
   * Bump debhelper-compat to 12.
   * debian/watch: use uscan version 4.
   * Add debian/upstream/metadata.
   * Add build dependency on libmodule-install-perl.
   * Add debian/tests/pkg-perl/syntax-skip to enable more autopkgtests.
   * Use HTTPS for a license URL in debian/copyright.
Checksums-Sha256: 
 ab19a489ac6367b10fa8a41b62e997e223f5d11831972c4a59dda780b864ac9f 2444 
libwww-curl-perl_4.17-6.dsc
 e256bcc2c30ab0ca550bc947f12c3fbc9776c425ebdad51f1ea3e570ef59bedf 14204 
libwww-curl-perl_4.17-6.debian.tar.xz
 5564ef8d8e26043c0518eccf05ace661b734bb0659f832fe73674420070b2cb0 6911 
libwww-curl-perl_4.17-6_sourceonly.buildinfo
Checksums-Sha1: 
 7f68e07b79e69cc243b868c927921be4e9cb61f6 2444 libwww-curl-perl_4.17-6.dsc
 449cb4be1810ad45ef610caba3599f4c97ade163 14204 
libwww-curl-perl_4.17-6.debian.tar.xz
 6406a75ddbb196888e41dd7bf089b905cb5e877f 6911 
libwww-curl-perl_4.17-6_sourceonly.buildinfo
Files: 
 0e26854f782a6c6d2c4a70537168e7ea 2444 perl optional libwww-curl-perl_4.17-6.dsc
 dc42edcdaa20b3540a6db5f6939eabb2 14204 perl optional 
libwww-curl-perl_4.17-6.debian.tar.xz
 25d819ca592a92d9dfd31bc2fe77064b 6911 - - 
libwww-curl-perl_4.17-6_sourceonly.buildinfo

-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEE0eExbpOnYKgQTYX6uzpoAYZJqgYFAl2bVbVfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEQx
RTEzMTZFOTNBNzYwQTgxMDREODVGQUJCM0E2ODAxODY0OUFBMDYACgkQuzpoAYZJ
qgb7cQ//aOsjp5NreLUMhSOhxKTTjoBVmBDpo5LYrFw6Gvim5JgbWKEHwZJKIKpP
dlJ+MGppZ+8g0ylqrEdzitUXNukw+SWtxSIGT7Mi7TQyyyr/Nowg3KF1WQfzQFvi
MU2l5gnaC17DhCffed2vYoqi4D/AXO8T2TEvYwdoHE6tqOW7XkigNUNA245HsgFR
DfkjFrOIO2U2kZuEL1nYprtYHIS7T503pefCFPIZgrK2l6NgJlc7qFC07uqbDq8i
bmMQfU8JEXisv7+f897QZZ0kCsRfI9/IhYW0KJjmkWqQRyQxLTn8b0TjdqFIRigC
J+J8owJN4MtdYv4g42rzkNX8RAXVuOT4CPuKYjFxJP9h2M6xyr3Nl5WGygxvPTMS
o0tIOSIEuF4zNFXUtyPafEcjQGMl0sjSimNhldCkNc1vtna5xKMoTJzjOsTazIrn
T1BQdgEgHW8URkrtOtsKrSHODYDqiMSQ4dgES1lJKSJMvyjQ/cgo01kK7b4TEEkg
g+JxMo8aDpWo0D0r/j+25jBjOUDcBSBYn+HRQ+AbyWwE3nEUBEAz6bVA6/Uq98Rz
rz87KVFVYO+HFiF/+2P26BzQx5f2UwzkuW1aTI1FyzMfTSNDCSLQZ27XrITSeRsg
S0takL38oHbE4niqDWRHA8UpUgDV5CW/Do3DuWIcDr3Pj9f1kBk=
=0Uo2
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to