Report forwarded
to debian-bugs-dist@lists.debian.org, Debian Med Packaging Team <debian-med-packaging@lists.alioth.debian.org>: Bug#828308; Package src:gdcm.
(Sun, 26 Jun 2016 10:32:48 GMT) (full text, mbox, link).
Acknowledgement sent
to Kurt Roeckx <kurt@roeckx.be>:
New Bug report received and forwarded. Copy sent to Debian Med Packaging Team <debian-med-packaging@lists.alioth.debian.org>.
(Sun, 26 Jun 2016 10:32:49 GMT) (full text, mbox, link).
Source: gdcm
Version: 2.6.3-6
Severity: important
Control: block 827061 by -1
Hi,
OpenSSL 1.1.0 is about to released. During a rebuild of all packages using
OpenSSL this package fail to build. A log of that build can be found at:
https://breakpoint.cc/openssl-1.1-rebuild-2016-05-29/Attempted/gdcm_2.6.3-6_amd64-20160602-2113.build
On https://wiki.openssl.org/index.php/1.1_API_Changes you can see various of the
reasons why it might fail. There are also updated man pages at
https://www.openssl.org/docs/manmaster/ that should contain useful information.
There is a libssl-dev package available in experimental that contains a recent
snapshot, I suggest you try building against that to see if everything works.
If you have problems making things work, feel free to contact us.
Kurt
Added indication that bug 828308 blocks 827061
Request was from Kurt Roeckx <kurt@roeckx.be>
to submit@bugs.debian.org.
(Sun, 26 Jun 2016 10:32:50 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian Med Packaging Team <debian-med-packaging@lists.alioth.debian.org>: Bug#828308; Package src:gdcm.
(Mon, 27 Jun 2016 07:42:08 GMT) (full text, mbox, link).
Acknowledgement sent
to Mathieu Malaterre <malat@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Med Packaging Team <debian-med-packaging@lists.alioth.debian.org>.
(Mon, 27 Jun 2016 07:42:08 GMT) (full text, mbox, link).
Subject: error: aggregate 'X509_STORE_CTX cert_ctx' has incomplete type and
cannot be defined
Date: Mon, 27 Jun 2016 09:28:04 +0200
Control: retitle -1 missing include for 'X509_STORE_CTX cert_ctx'
The build log indicate a missing include header file:
/<<PKGBUILDDIR>>/Source/Common/gdcmOpenSSLP7CryptographicMessageSyntax.cxx:288:18:
error: aggregate 'X509_STORE_CTX cert_ctx' has incomplete type and
cannot be defined
X509_STORE_CTX cert_ctx;
^
Changed Bug title to 'missing include for 'X509_STORE_CTX cert_ctx'' from 'gdcm: FTBFS with openssl 1.1.0'.
Request was from Mathieu Malaterre <malat@debian.org>
to 828308-submit@bugs.debian.org.
(Mon, 27 Jun 2016 07:42:08 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian Med Packaging Team <debian-med-packaging@lists.alioth.debian.org>: Bug#828308; Package src:gdcm.
(Tue, 28 Jun 2016 18:09:08 GMT) (full text, mbox, link).
Acknowledgement sent
to Gert Wollny <gw.fossdev@gmail.com>:
Extra info received and forwarded to list. Copy sent to Debian Med Packaging Team <debian-med-packaging@lists.alioth.debian.org>.
(Tue, 28 Jun 2016 18:09:08 GMT) (full text, mbox, link).
Subject: gdcm: Re: missing include for 'X509_STORE_CTX cert_ctx'
Date: Tue, 28 Jun 2016 20:04:29 +0200
>The build log indicate a missing include header file:
Actually no. The openssl-1.1.0 header files no longer expose the full
structures but only a forward declaration and one needs to use
structure related functions to access its members.
For example
"cert_ctx->cert_store"
must be replaced by
SL_CTX_get_cert_store(cert_ctx)
Best,
Gert
Severity set to 'serious' from 'important'
Request was from Kurt Roeckx <kurt@roeckx.be>
to control@bugs.debian.org.
(Wed, 26 Oct 2016 17:55:24 GMT) (full text, mbox, link).
Added tag(s) fixed-upstream.
Request was from bts-link-upstream@lists.alioth.debian.org
to control@bugs.debian.org.
(Thu, 03 Nov 2016 17:51:25 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian Med Packaging Team <debian-med-packaging@lists.alioth.debian.org>: Bug#828308; Package src:gdcm.
(Mon, 07 Nov 2016 06:57:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Mathieu Malaterre <malat@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Med Packaging Team <debian-med-packaging@lists.alioth.debian.org>.
(Mon, 07 Nov 2016 06:57:03 GMT) (full text, mbox, link).
Added tag(s) patch.
Request was from Mathieu Malaterre <malat@debian.org>
to 828308-submit@bugs.debian.org.
(Mon, 07 Nov 2016 06:57:03 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian Med Packaging Team <debian-med-packaging@lists.alioth.debian.org>: Bug#828308; Package src:gdcm.
(Mon, 07 Nov 2016 11:03:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Gert Wollny <gw.fossdev@gmail.com>:
Extra info received and forwarded to list. Copy sent to Debian Med Packaging Team <debian-med-packaging@lists.alioth.debian.org>.
(Mon, 07 Nov 2016 11:03:03 GMT) (full text, mbox, link).
Control: severity important
Hello Mathieu,
thanks for the patch, but since itksnap uses gdcm, and also QT5, and the
latter uses dlload to pull in openssl-1.0 dynamically (and this will
not change for stretch), gdcm will also be build against the older
version of openssl.
Hence I will not apply the patch now, but wait until you release the
next gdcm version to close this bug.
best,
Gert
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian Med Packaging Team <debian-med-packaging@lists.alioth.debian.org>: Bug#828308; Package src:gdcm.
(Mon, 07 Nov 2016 13:06:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Mathieu Malaterre <malat@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Med Packaging Team <debian-med-packaging@lists.alioth.debian.org>.
(Mon, 07 Nov 2016 13:06:03 GMT) (full text, mbox, link).
To: Gert Wollny <gw.fossdev@gmail.com>, 828308@bugs.debian.org
Subject: Re: Bug#828308: downgrade severity, because the bug is not RC anymore
Date: Mon, 7 Nov 2016 14:03:29 +0100
Control: severity -1 important
# missing -1
On Mon, Nov 7, 2016 at 11:59 AM, Gert Wollny <gw.fossdev@gmail.com> wrote:
> Control: severity important
>
> Hello Mathieu,
>
> thanks for the patch, but since itksnap uses gdcm, and also QT5, and the
> latter uses dlload to pull in openssl-1.0 dynamically (and this will
> not change for stretch), gdcm will also be build against the older
> version of openssl.
>
> Hence I will not apply the patch now, but wait until you release the
> next gdcm version to close this bug.
Nice catch ! Thanks for the careful analysis, I had not thought about this.
-M
Severity set to 'important' from 'serious'
Request was from Mathieu Malaterre <malat@debian.org>
to 828308-submit@bugs.debian.org.
(Mon, 07 Nov 2016 13:06:03 GMT) (full text, mbox, link).
Bug 828308 cloned as bug 850896
Request was from Niels Thykier <niels@thykier.net>
to control@bugs.debian.org.
(Tue, 10 Jan 2017 21:45:02 GMT) (full text, mbox, link).
Added indication that bug 850896 blocks
Request was from Niels Thykier <niels@thykier.net>
to control@bugs.debian.org.
(Tue, 10 Jan 2017 21:45:03 GMT) (full text, mbox, link).
Changed Bug title to 'gdcm: Please migrate to openssl1.1 in buster' from 'missing include for 'X509_STORE_CTX cert_ctx''.
Request was from Niels Thykier <niels@thykier.net>
to control@bugs.debian.org.
(Tue, 10 Jan 2017 21:45:04 GMT) (full text, mbox, link).
Removed indication that bug 850896 blocks 827061
Request was from Niels Thykier <niels@thykier.net>
to control@bugs.debian.org.
(Tue, 10 Jan 2017 21:45:05 GMT) (full text, mbox, link).
Added tag(s) sid and buster.
Request was from Niels Thykier <niels@thykier.net>
to control@bugs.debian.org.
(Tue, 10 Jan 2017 21:45:05 GMT) (full text, mbox, link).
Reply sent
to Gert Wollny <gewo@debian.org>:
You have taken responsibility.
(Sat, 04 Mar 2017 09:06:07 GMT) (full text, mbox, link).
Notification sent
to Kurt Roeckx <kurt@roeckx.be>:
Bug acknowledged by developer.
(Sat, 04 Mar 2017 09:06:07 GMT) (full text, mbox, link).
Source: gdcm
Source-Version: 2.6.7-1~exp1
We believe that the bug you reported is fixed in the latest version of
gdcm, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 850896@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Gert Wollny <gewo@debian.org> (supplier of updated gdcm package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Fri, 03 Mar 2017 17:47:13 +0000
Source: gdcm
Binary: libgdcm2.6 libgdcm-tools libgdcm2-dev libgdcm-cil python-gdcm libvtkgdcm2.6 libvtkgdcm2-dev libvtkgdcm-cil python-vtkgdcm libvtkgdcm-tools gdcm-doc libgdcm-java libvtkgdcm-java
Architecture: source
Version: 2.6.7-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Med Packaging Team <debian-med-packaging@lists.alioth.debian.org>
Changed-By: Gert Wollny <gewo@debian.org>
Description:
gdcm-doc - Grassroots DICOM documentation
libgdcm-cil - Grassroots DICOM CLI bindings
libgdcm-java - Grassroots DICOM Java bindings
libgdcm-tools - Grassroots DICOM tools and utilities
libgdcm2-dev - Grassroots DICOM development libraries and headers
libgdcm2.6 - Grassroots DICOM runtime libraries
libvtkgdcm-cil - Grassroots DICOM VTK CLI bindings
libvtkgdcm-java - Grassroots DICOM VTK Java bindings
libvtkgdcm-tools - Grassroots DICOM VTK tools and utilities
libvtkgdcm2-dev - Grassroots DICOM VTK development libraries and headers
libvtkgdcm2.6 - Grassroots DICOM VTK runtime libraries
python-gdcm - Grassroots DICOM Python bindings
python-vtkgdcm - Grassroots DICOM VTK/Python bindings
Closes: 842678850896
Changes:
gdcm (2.6.7-1~exp1) experimental; urgency=medium
.
* New upstream version 2.6.7
* d/control: Depend on libssl-dev Closes: #850896
* d/control,d/rules: Drop -dbg packages Closes: #842678
* d/control: Update GW uploader email
Checksums-Sha1:
e359837e2d68834d60a30d803fa348d0c6738cf1 3274 gdcm_2.6.7-1~exp1.dsc
5e59b67ea311f6df0b3bf1c8d35aa1c2f9d560e9 3677386 gdcm_2.6.7.orig.tar.bz2
f656445ecb67038d1bb035f96b46e057d1605f52 19556 gdcm_2.6.7-1~exp1.debian.tar.xz
6d9164316ed9c95ee19d043bc3d2d9eed598b432 30447 gdcm_2.6.7-1~exp1_source.buildinfo
Checksums-Sha256:
778baaea779b43430aefd40d38a389c9edda5d1e5a13282635db4c74e2a1dab7 3274 gdcm_2.6.7-1~exp1.dsc
773aeeea8a3ffdfee38346940b5720ce2e4cd1ac27eeed4851609c8fbb01a1ac 3677386 gdcm_2.6.7.orig.tar.bz2
72110da15a72464a78b5fdefc853806117b8851c619994ce993659758a521f9e 19556 gdcm_2.6.7-1~exp1.debian.tar.xz
7e96765e1ae8c62b3ce032357ff8b196805a6024d60e9379bcb3ace0578a912b 30447 gdcm_2.6.7-1~exp1_source.buildinfo
Files:
2ae2c412d800b70fb2e86e193dc63def 3274 libs optional gdcm_2.6.7-1~exp1.dsc
c81bfca1472bf26e22dd6c30a54fb024 3677386 libs optional gdcm_2.6.7.orig.tar.bz2
073930aa77bc27607460d6896f4a5864 19556 libs optional gdcm_2.6.7-1~exp1.debian.tar.xz
0c8515820b309a3c7788cd74cdafb8e9 30447 libs optional gdcm_2.6.7-1~exp1_source.buildinfo
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCAAdFiEENGr+2YOvnEff6Rr7+B42i5smq5gFAli6figACgkQ+B42i5sm
q5g/nAf/Yqc2fXxLjqZ/mXoEK0O8Q125HGvlKnmVzV8ohIV+DPbAIyYHd5VdXmgm
bxqKB3H9WCNq+8gv+YM9D2fce2nYvU1vIp4J3pawZcX97F9zTWOAAp/AhzJGqmX9
ZK6vaJCr92WFqgXfV9YIoWWQZ10gVfI9BwZenV7cP026iScPlOIFvg5kYci/Kdrp
v3OvgJbWImihHFMhMlgFnahOcORM6KyamsVO7gS7HiT8qc9p+Qk+aLibByPm+5dD
IPxWbxwp+DH2ko3BTC1h1x4fQ56LfAIHDd46s5Vjm0gnJheHqj40JC3C5VC0+hLn
ODd66hz4mo0oylw1wAkHVV4eDwd/cw==
=1etM
-----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Fri, 21 Jul 2017 07:32:23 GMT) (full text, mbox, link).
Debbugs is free software and licensed under the terms of the GNU General
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.