Your message dated Tue, 19 Jul 2022 07:51:24 +0000
with message-id <[email protected]>
and subject line Bug#1011734: fixed in ruby-certificate-authority 1.0.0-2
has caused the Debian Bug report #1011734,
regarding ruby-certificate-authority: FTBFS: ERROR: Test "ruby3.0" failed:
Failure/Error:
expect(@cert_with_extensions.extensions["authorityKeyIdentifier"]).to
eq(expected_authorityKeyIdentifier)
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1011734: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011734
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: ruby-certificate-authority
Version: 1.0.0-1
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: [email protected]
Usertags: ftbfs-20220525 ftbfs-bookworm
Hi,
During a rebuild of all packages in sid, your package failed to build
on amd64.
Relevant part (hopefully):
> Failure/Error:
> expect(@cert_with_extensions.extensions["authorityKeyIdentifier"]).to
> eq(expected_authorityKeyIdentifier)
>
> expected:
> #<CertificateAuthority::Extensions::AuthorityKeyIdentifier:0x00005627020ac628
> @critical=false,
> @identifier="keyid:4C:58:CB:25:F0:41:4F:52:F4:28:C8:81:43:9B:A6:A8:A0:E6:92:E5">
> got:
> #<CertificateAuthority::Extensions::AuthorityKeyIdentifier:0x00005627020afe18
> @critical=false,
> @identifier="4C:58:CB:25:F0:41:4F:52:F4:28:C8:81:43:9B:A6:A8:A0:E6:92:E5">
>
> (compared using ==)
>
> Diff:
>
> @@ -1,5 +1,4 @@
>
> -#<CertificateAuthority::Extensions::AuthorityKeyIdentifier:0x00005627020ac628
>
> +#<CertificateAuthority::Extensions::AuthorityKeyIdentifier:0x00005627020afe18
> @critical=false,
> - @identifier=
> - "keyid:4C:58:CB:25:F0:41:4F:52:F4:28:C8:81:43:9B:A6:A8:A0:E6:92:E5">
> +
> @identifier="4C:58:CB:25:F0:41:4F:52:F4:28:C8:81:43:9B:A6:A8:A0:E6:92:E5">
> # ./spec/units/certificate_spec.rb:427:in `block (3 levels) in <top
> (required)>'
>
> Finished in 1.66 seconds (files took 0.55042 seconds to load)
> 189 examples, 1 failure, 1 pending
>
> Failed examples:
>
> rspec ./spec/units/certificate_spec.rb:403 #
> CertificateAuthority::Certificate from_openssl should check to make sure that
> if a certificate had extensions they were imported
>
> [33m[Coveralls] Outside the CI environment, not sending data.[0m
> Stopped processing SimpleCov as a previous error not related to SimpleCov has
> been detected
> /usr/bin/ruby3.0
> -I/usr/share/rubygems-integration/all/gems/rspec-support-3.10.3/lib:/usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/lib
> /usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/exe/rspec
> --pattern ./spec/\*\*/\*_spec.rb --exclude-pattern
> ./spec/units/pkcs11_key_material_spec.rb --format documentation failed
> mv ./.gem2deb.Gemfile.lock Gemfile.lock
> ERROR: Test "ruby3.0" failed:
The full build log is available from:
http://qa-logs.debian.net/2022/05/25/ruby-certificate-authority_1.0.0-1_unstable.log
All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20220525;[email protected]
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20220525&[email protected]&allbugs=1&cseverity=1&ctags=1&caffected=1#results
A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!
If you reassign this bug to another package, please marking it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects
If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.
--- End Message ---
--- Begin Message ---
Source: ruby-certificate-authority
Source-Version: 1.0.0-2
Done: Lucas Kanashiro <[email protected]>
We believe that the bug you reported is fixed in the latest version of
ruby-certificate-authority, which is due to be installed in the Debian FTP
archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Lucas Kanashiro <[email protected]> (supplier of updated
ruby-certificate-authority package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 19 Jul 2022 04:15:41 -0300
Source: ruby-certificate-authority
Architecture: source
Version: 1.0.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Team
<[email protected]>
Changed-By: Lucas Kanashiro <[email protected]>
Closes: 1011734
Changes:
ruby-certificate-authority (1.0.0-2) unstable; urgency=medium
.
* Team upload.
* d/p/0004-remove-keyid-prefix-from-test-string.patch: Fix test causing
FTBFS due to OpenSSL 3 changes (Closes: #1011734).
Checksums-Sha1:
8aa01fce1622e2af0a18427c15c32f9352ad8482 2280
ruby-certificate-authority_1.0.0-2.dsc
be66577e08ff22679b6596ba39be60df59444ac0 6288
ruby-certificate-authority_1.0.0-2.debian.tar.xz
Checksums-Sha256:
fee355a35ed52656e8d1ec6d6fb5830fc333889211f00ef9d671d60a5c127e9c 2280
ruby-certificate-authority_1.0.0-2.dsc
ae4174ee361475c8094c08998cdb4bedbc3c5e459b29b92928d5401395db3e50 6288
ruby-certificate-authority_1.0.0-2.debian.tar.xz
Files:
b49d81acc3250cc1b288f70b80db0e50 2280 ruby optional
ruby-certificate-authority_1.0.0-2.dsc
069677f139c4d827652f246c080b4143 6288 ruby optional
ruby-certificate-authority_1.0.0-2.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=g+zg
-----END PGP SIGNATURE-----
--- End Message ---