• Bug#1064717: jss: FTBFS: prtypes.h:556:38: error: size of array =?UTF-8

    From Lucas Nussbaum@21:1/5 to All on Sun Feb 25 21:00:26 2024
    Source: jss
    Version: 5.4.2-1
    Severity: serious
    Justification: FTBFS
    Tags: trixie sid ftbfs
    User: lucas@debian.org
    Usertags: ftbfs-20240224 ftbfs-trixie

    Hi,

    During a rebuild of all packages in sid, your package failed to build
    on amd64.


    Relevant part (hopefully):
    cd /<<PKGBUILDDIR>>/native/src/main/native/org/mozilla/jss/ssl && /usr/bin/cc -fPIC -D_FORTIFY_SOURCE=2 -Wdate-time -fcf-protection -Werror=format-security -Wformat -fstack-clash-protection -fstack-protector-strong -ffile-prefix-map=/<<PKGBUILDDIR>>=. -
    O2 -g -O2 -Wall -std=gnu99 -Wno-cast-function-type -Wno-unused-parameter -Wno-unknown-warning-option -Wno-unused-but-set-variable -Werror-implicit-function-declaration -Wno-switch -I/<<PKGBUILDDIR>>/build/include/jss -I/usr/lib/jvm/default-java/include -
    I/usr/lib/jvm/default-java/include/linux -I/usr/lib/jvm/default-java/include -I/usr/include/nspr -I/usr/include/nss -L/usr/lib/x86_64-linux-gnu -L/usr/lib/x86_64-linux-gnu -o /<<PKGBUILDDIR>>/build/lib/SSLCipher.o -c /<<PKGBUILDDIR>>/native/src/main/
    native/org/mozilla/jss/ssl/SSLCipher.c
    In file included from /usr/include/nspr/pratom.h:14,
    from /usr/include/nspr/nspr.h:9,
    from /<<PKGBUILDDIR>>/native/src/main/native/org/mozilla/jss/ssl/SSLCipher.c:1:
    /usr/include/nspr/prtypes.h:556:38: error: size of array ‘arg’ is negative
    556 | extern void pr_static_assert(int arg[(condition) ? 1 : -1])
    | ^~~ /<<PKGBUILDDIR>>/native/src/main/native/org/mozilla/jss/ssl/SSLCipher.c:37:1: note: in expansion of macro ‘PR_STATIC_ASSERT’
    37 | PR_STATIC_ASSERT(PR_ARRAY_SIZE(kea_alg_defs) == ssl_kea_size);
    | ^~~~~~~~~~~~~~~~
    /usr/include/nspr/prtypes.h:556:38: warning: argument 1 of type ‘int *’ declared as a pointer [-Warray-parameter=]
    556 | extern void pr_static_assert(int arg[(condition) ? 1 : -1])
    | ~~~~^~~~~~~~~~~~~~~~~~~~~~~~~ /<<PKGBUILDDIR>>/native/src/main/native/org/mozilla/jss/ssl/SSLCipher.c:37:1: note: in expansion of macro ‘PR_STATIC_ASSERT’
    37 | PR_STATIC_ASSERT(PR_ARRAY_SIZE(kea_alg_defs) == ssl_kea_size);
    | ^~~~~~~~~~~~~~~~
    /usr/include/nspr/prtypes.h:556:38: note: previously declared as an array ‘int[1]’
    556 | extern void pr_static_assert(int arg[(condition) ? 1 : -1])
    | ~~~~^~~~~~~~~~~~~~~~~~~~~~~~~ /<<PKGBUILDDIR>>/native/src/main/native/org/mozilla/jss/ssl/SSLCipher.c:24:1: note: in expansion of macro ‘PR_STATIC_ASSERT’
    24 | PR_STATIC_ASSERT(PR_ARRAY_SIZE(auth_alg_defs) == ssl_auth_size);
    | ^~~~~~~~~~~~~~~~
    cc1: note: unrecognized command-line option ‘-Wno-unknown-warning-option’ may have been intended to silence earlier diagnostics
    make[4]: *** [CMakeFiles/generate_c.dir/build.make:275: lib/SSLCipher.o] Error 1


    The full build log is available from: http://qa-logs.debian.net/2024/02/24/jss_5.4.2-1_unstable.log

    All bugs filed during this archive rebuild are listed at: https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20240224;users=lucas@debian.org
    or: https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20240224&fusertaguser=lucas@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results

    A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

    If you reassign this bug to another package, please mark it as 'affects'-ing this package. See https://www.debian.org/Bugs/server-control#affects

    If you fail to reproduce this, please provide a build log and diff it with mine so that we can identify if something relevant changed in the meantime.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Debian Bug Tracking System@21:1/5 to All on Thu Feb 29 16:10:02 2024
    This is a multi-part message in MIME format...

    Your message dated Thu, 29 Feb 2024 15:03:50 +0000
    with message-id <E1rfhws-00BlQy-Ek@fasolo.debian.org>
    and subject line Bug#1064717: fixed in jss 5.5.0-1
    has caused the Debian Bug report #1064717,
    regarding jss: FTBFS: prtypes.h:556:38: error: size of array ‘arg’ is negative
    to be marked as done.

    This means that you claim that the problem has been dealt with.
    If this is not the case it is now your responsibility to reopen the
    Bug report if necessary, and/or fix the problem forthwith.

    (NB: If you are a system administrator and have no idea what this
    message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org
    immediately.)


    --
    1064717: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064717
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems

    Received: (at submit) by bugs.debian.org; 25 Feb 2024 19:49:42 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.6-bugs.debian.org_2005_01_02
    (2021-04-09) on buxtehude.debian.org
    X-Spam-Level:
    X-Spam-Status: No, score=-105.3 required=4.0 tests=BAYES_00,DKIMWL_WL_HIGH,
    DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FROMDEVELOPER,
    SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE,UNPARSEABLE_RELAY,
    USER_IN_DKIM_WELCOMELIST,USER_IN_DKIM_WHITELIST autolearn=ham
    autolearn_force=no version=3.4.6-bugs.debian.org_2005_01_02 X-Spam-Bayes: score:0.0000 Tokens: new, 30; hammy, 150; neutral, 195; spammy,
    0. spammytokens:
    hammytokens:0.000-+--Hx-spam-relays-external:sk:stravin,
    0.000-+--H*RT:sk:stravin, 0.000-+--Hx-spam-relays-external:311,
    0.000-+--H*RT:108, 0.000-+--H*RT:311
    Return-path: <lucas@debian.org>
    Received: from stravinsky.debian.org ([2001:41b8:2