From fsfs at debian.org Sun Sep 19 14:45:57 2021 From: fsfs at debian.org (Florian Schlichting) Date: Sun, 19 Sep 2021 15:45:57 +0200 Subject: [Pkg-auth-maintainers] packaging yubikey-manager-qt within the Authentication tools packaging team In-Reply-To: <20210919125107.6xdg3rnrv2ennp7b@tarteausucre.boxen.rosetwig.systems> References: <20210919125107.6xdg3rnrv2ennp7b@tarteausucre.boxen.rosetwig.systems> Message-ID: Hi Taowa, On Sun, Sep 19, 2021 at 08:51:08AM -0400, Taowa wrote: > I've granted you access to the salsa team :). I don't really think > there's anything specific you'll need to know. that was quick, thank you very much! I've pushed yubikey-manager-qt and uploaded it to NEW. I might look at updating yubikey-manager to a new upstream version if that's welcome? Florian From ftpmaster at ftp-master.debian.org Sun Sep 19 14:48:36 2021 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Sun, 19 Sep 2021 13:48:36 +0000 Subject: [Pkg-auth-maintainers] Processing of yubikey-manager-qt_1.2.3-1_amd64.changes Message-ID: yubikey-manager-qt_1.2.3-1_amd64.changes uploaded successfully to localhost along with the files: yubikey-manager-qt_1.2.3-1.dsc yubikey-manager-qt_1.2.3.orig.tar.gz yubikey-manager-qt_1.2.3.orig.tar.gz.asc yubikey-manager-qt_1.2.3-1.debian.tar.xz yubikey-manager-qt-dbgsym_1.2.3-1_amd64.deb yubikey-manager-qt_1.2.3-1_amd64.buildinfo yubikey-manager-qt_1.2.3-1_amd64.deb Greetings, Your Debian queue daemon (running on host usper.debian.org) From ftpmaster at ftp-master.debian.org Sun Sep 19 15:33:25 2021 From: ftpmaster at ftp-master.debian.org (Debian FTP Masters) Date: Sun, 19 Sep 2021 14:33:25 +0000 Subject: [Pkg-auth-maintainers] yubikey-manager-qt_1.2.3-1_amd64.changes is NEW Message-ID: binary:yubikey-manager-qt is NEW. binary:yubikey-manager-qt is NEW. source:yubikey-manager-qt is NEW. Your package has been put into the NEW queue, which requires manual action from the ftpteam to process. The upload was otherwise valid (it had a good OpenPGP signature and file hashes are valid), so please be patient. Packages are routinely processed through to the archive, and do feel free to browse the NEW queue[1]. If there is an issue with the upload, you will receive an email from a member of the ftpteam. If you have any questions, you may reply to this email. [1]: https://ftp-master.debian.org/new.html or https://ftp-master.debian.org/backports-new.html for *-backports From mbanck at debian.org Mon Sep 27 11:09:45 2021 From: mbanck at debian.org (Michael Banck) Date: Mon, 27 Sep 2021 12:09:45 +0200 Subject: [Pkg-auth-maintainers] =?utf-8?q?Bug=23995157=3A_FTBFS_with_open?= =?utf-8?b?c3NsMzogZXJyb3I6IOKAmFNIQTI1Nl9Jbml04oCZIGlzIGRlcHJlY2F0ZWQ6?= =?utf-8?q?_Since_OpenSSL_3=2E0?= Message-ID: <163273738536.14583.6041296796937163248.reportbug@lightning.caipicrew.dd-dns.de> Source: libfido2 Version: 1.8.0-1 Severity: important Dear Maintainer, libfido2 fails to build with openssl3 from experimental: |[ 0%] Building C object src/CMakeFiles/fido2.dir/aes256.c.o |cd /<>/obj-x86_64-linux-gnu/src && /usr/bin/cc -DHAVE_CBOR_H -DHAVE_CLOCK_GETTIME -DHAVE_DEV_URANDOM -DHAVE_ENDIAN_H -DHAVE_ERR_H -DHAVE_EXPLICIT_BZERO -DHAVE_GETLINE -DHAVE_GETOPT -DHAVE_GETPAGESIZE -DHAVE_GETRANDOM -DHAVE_OPENSSLV_H -DHAVE_SIGACTION -DHAVE_SIGNAL_H -DHAVE_SYSCONF -DHAVE_SYS_RANDOM_H -DHAVE_UNISTD_H -DSIGNAL_EXAMPLE -DTLS=__thread -D_FIDO_INTERNAL -D_FIDO_MAJOR=1 -D_FIDO_MINOR=8 -D_FIDO_PATCH=0 -I/<>/src -D_POSIX_C_SOURCE=200809L -D_BSD_SOURCE -D_GNU_SOURCE -D_DEFAULT_SOURCE -std=c99 -g -O2 -ffile-prefix-map=/<>=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -Wall -Wextra -Werror -Wshadow -Wcast-qual -Wwrite-strings -Wmissing-prototypes -Wbad-function-cast -pedantic -pedantic-errors -fstack-protector-all -Wno-unused-result -Wconversion -Wsign-conversion -MD -MT src/CMakeFiles/fido2.dir/aes256.c.o -MF CMakeFiles/fido2.dir/aes256.c.o.d -o CMakeFiles/fido2.dir/aes256.c.o -c /<>/src/aes256.c |[ 0%] Generating eddsa_pk_new.3 |cd /<>/obj-x86_64-linux-gnu/man && cp -f /<>/man/eddsa_pk_new.3 . |[ 0%] Generating es256_pk_new.3 |cd /<>/obj-x86_64-linux-gnu/man && cp -f /<>/man/es256_pk_new.3 . |[ 0%] Generating fido2-assert.1 |cd /<>/obj-x86_64-linux-gnu/man && cp -f /<>/man/fido2-assert.1 . |[ 0%] Generating fido2-cred.1 |cd /<>/obj-x86_64-linux-gnu/man && cp -f /<>/man/fido2-cred.1 . |[ 0%] Generating fido2-token.1 |cd /<>/obj-x86_64-linux-gnu/man && cp -f /<>/man/fido2-token.1 . |/<>/src/assert.c: In function ?fido_get_signed_hash?: |/<>/src/assert.c:389:3: error: ?SHA256_Init? is deprecated: Since OpenSSL 3.0 [-Werror=deprecated-declarations] | 389 | if (dgst->len < SHA256_DIGEST_LENGTH || SHA256_Init(&ctx) == 0 || | | ^~ |[...] |In file included from /<>/src/assert.c:8: |/usr/include/openssl/sha.h:76:27: note: declared here | 76 | OSSL_DEPRECATEDIN_3_0 int SHA256_Final(unsigned char *md, SHA256_CTX *c); | | ^~~~~~~~~~~~ |/<>/src/assert.c: In function ?fido_verify_sig_es256?: |/<>/src/assert.c:433:6: error: ?EVP_PKEY_get0_EC_KEY? is deprecated: Since OpenSSL 3.0 [-Werror=deprecated-declarations] | 433 | (ec = EVP_PKEY_get0_EC_KEY(pkey)) == NULL) { | | ^ |In file included from /<>/src/fido.h:11, | from /<>/src/assert.c:10: |/usr/include/openssl/evp.h:1372:25: note: declared here | 1372 | const struct ec_key_st *EVP_PKEY_get0_EC_KEY(const EVP_PKEY *pkey); | | ^~~~~~~~~~~~~~~~~~~~ |/<>/src/assert.c:433:10: error: assignment discards ?const? qualifier from pointer target type [-Wdiscarded-qualifiers] | 433 | (ec = EVP_PKEY_get0_EC_KEY(pkey)) == NULL) { | | ^ |/<>/src/assert.c:438:2: error: ?ECDSA_verify? is deprecated: Since OpenSSL 3.0 [-Werror=deprecated-declarations] [...] |cc1: all warnings being treated as errors |make[3]: *** [src/CMakeFiles/fido2.dir/build.make:93: src/CMakeFiles/fido2.dir/assert.c.o] Error 1 |make[3]: *** Waiting for unfinished jobs.... Filing this as important for now, as long as openssl3 is not in unstable. Michael