Source: sssd
Version: 2.10.1-2
Severity: minor
Tags: trixie sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-shuffle

Hi,

GNU Make now has a --shuffle option that simulates non-deterministic ordering
of target prerequisites. See
https://trofi.github.io/posts/238-new-make-shuffle-mode.html and also previous
work in Debian by Santiago Vila:
https://people.debian.org/~sanvila/make-shuffle/

This package fails to build with make --shuffle=reverse.
This is likely to be caused by a missing dependency in
debian/rules or an upstream Makefile.

More information about this mass bug filing is available at
https://wiki.debian.org/qa.debian.org/FTBFS/Shuffle

Relevant part (hopefully):
> make[3]: Entering directory '/build/reproducible-path/sssd-2.10.1/build'
> /bin/bash: line 1: git: command not found
> Makefile:47402: update target 
> '/build/reproducible-path/sssd-2.10.1/build/src/config/SSSDConfig/sssdoptions.py'
>  due to: target does not exist
> cp ../src/config/SSSDConfig/sssdoptions.py ./src/config/SSSDConfig/
> Makefile:47399: update target 
> '/build/reproducible-path/sssd-2.10.1/build/src/config/SSSDConfig/ipachangeconf.py'
>  due to: target does not exist
> cp ../src/config/SSSDConfig/ipachangeconf.py ./src/config/SSSDConfig/
> Makefile:13930: update target 'src/util/.deps/.dirstamp' due to: target does 
> not exist
> /usr/bin/mkdir -p src/util/.deps
> Makefile:13927: update target 'src/util/.dirstamp' due to: target does not 
> exist
> /usr/bin/mkdir -p src/util
> : >>src/util/.deps/.dirstamp
> : >>src/util/.dirstamp
> Makefile:15517: update target 'src/ldb_modules/.deps/.dirstamp' due to: 
> target does not exist
> /usr/bin/mkdir -p src/ldb_modules/.deps
> : >>src/ldb_modules/.deps/.dirstamp
> Makefile:15514: update target 'src/ldb_modules/.dirstamp' due to: target does 
> not exist
> /usr/bin/mkdir -p src/ldb_modules
> Makefile:13105: update target 'config.h' due to: stamp-h1
> test -f config.h || rm -f stamp-h1
> : >>src/ldb_modules/.dirstamp
> test -f config.h || make  stamp-h1
> Makefile:47339: update target 'src/sysv/systemd/sssd-kcm.service' due to: 
> target does not exist
> /usr/bin/mkdir -p src/sysv/systemd/
> Makefile:47335: update target 'src/sysv/systemd/sssd-kcm.socket' due to: 
> target does not exist
> /usr/bin/mkdir -p src/sysv/systemd/
> rm -f src/sysv/systemd/sssd-kcm.service 
> src/sysv/systemd/sssd-kcm.service.tmp; srcdir=''; test -f 
> ./src/sysv/systemd/sssd-kcm.service.in || srcdir=../; /usr/bin/sed -e 
> 's|@sbindir[@]|/usr/sbin|g' -e 's|@environment_file[@]|/etc/default/sssd|g' 
> -e 's|@localstatedir[@]|/var|g' -e 's|@runstatedir[@]|/run|g' -e 
> 's|@logpath[@]|/var/log/sssd|g' -e 's|@libexecdir[@]|/usr/libexec|g' -e 
> 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 's|@prefix[@]|/usr|g' -e 
> 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' 
> ${srcdir}src/sysv/systemd/sssd-kcm.service.in 
> >src/sysv/systemd/sssd-kcm.service.tmp; mv 
> src/sysv/systemd/sssd-kcm.service.tmp src/sysv/systemd/sssd-kcm.service
> rm -f src/sysv/systemd/sssd-kcm.socket src/sysv/systemd/sssd-kcm.socket.tmp; 
> srcdir=''; test -f ./src/sysv/systemd/sssd-kcm.socket.in || srcdir=../; 
> /usr/bin/sed -e 's|@sbindir[@]|/usr/sbin|g' -e 
> 's|@environment_file[@]|/etc/default/sssd|g' -e 's|@localstatedir[@]|/var|g' 
> -e 's|@runstatedir[@]|/run|g' -e 's|@logpath[@]|/var/log/sssd|g' -e 
> 's|@libexecdir[@]|/usr/libexec|g' -e 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 
> 's|@prefix[@]|/usr|g' -e 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' 
> ${srcdir}src/sysv/systemd/sssd-kcm.socket.in 
> >src/sysv/systemd/sssd-kcm.socket.tmp; mv 
> src/sysv/systemd/sssd-kcm.socket.tmp src/sysv/systemd/sssd-kcm.socket
> Makefile:47331: update target 'src/sysv/systemd/sssd-sudo.service' due to: 
> target does not exist
> /usr/bin/mkdir -p src/sysv/systemd/
> Makefile:47327: update target 'src/sysv/systemd/sssd-sudo.socket' due to: 
> target does not exist
> /usr/bin/mkdir -p src/sysv/systemd/
> Makefile:47323: update target 'src/sysv/systemd/sssd-ssh.service' due to: 
> target does not exist
> /usr/bin/mkdir -p src/sysv/systemd/
> rm -f src/sysv/systemd/sssd-sudo.service 
> src/sysv/systemd/sssd-sudo.service.tmp; srcdir=''; test -f 
> ./src/sysv/systemd/sssd-sudo.service.in || srcdir=../; /usr/bin/sed -e 
> 's|@sbindir[@]|/usr/sbin|g' -e 's|@environment_file[@]|/etc/default/sssd|g' 
> -e 's|@localstatedir[@]|/var|g' -e 's|@runstatedir[@]|/run|g' -e 
> 's|@logpath[@]|/var/log/sssd|g' -e 's|@libexecdir[@]|/usr/libexec|g' -e 
> 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 's|@prefix[@]|/usr|g' -e 
> 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' 
> ${srcdir}src/sysv/systemd/sssd-sudo.service.in 
> >src/sysv/systemd/sssd-sudo.service.tmp; mv 
> src/sysv/systemd/sssd-sudo.service.tmp src/sysv/systemd/sssd-sudo.service
> rm -f src/sysv/systemd/sssd-sudo.socket 
> src/sysv/systemd/sssd-sudo.socket.tmp; srcdir=''; test -f 
> ./src/sysv/systemd/sssd-sudo.socket.in || srcdir=../; /usr/bin/sed -e 
> 's|@sbindir[@]|/usr/sbin|g' -e 's|@environment_file[@]|/etc/default/sssd|g' 
> -e 's|@localstatedir[@]|/var|g' -e 's|@runstatedir[@]|/run|g' -e 
> 's|@logpath[@]|/var/log/sssd|g' -e 's|@libexecdir[@]|/usr/libexec|g' -e 
> 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 's|@prefix[@]|/usr|g' -e 
> 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' 
> ${srcdir}src/sysv/systemd/sssd-sudo.socket.in 
> >src/sysv/systemd/sssd-sudo.socket.tmp; mv 
> src/sysv/systemd/sssd-sudo.socket.tmp src/sysv/systemd/sssd-sudo.socket
> rm -f src/sysv/systemd/sssd-ssh.service 
> src/sysv/systemd/sssd-ssh.service.tmp; srcdir=''; test -f 
> ./src/sysv/systemd/sssd-ssh.service.in || srcdir=../; /usr/bin/sed -e 
> 's|@sbindir[@]|/usr/sbin|g' -e 's|@environment_file[@]|/etc/default/sssd|g' 
> -e 's|@localstatedir[@]|/var|g' -e 's|@runstatedir[@]|/run|g' -e 
> 's|@logpath[@]|/var/log/sssd|g' -e 's|@libexecdir[@]|/usr/libexec|g' -e 
> 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 's|@prefix[@]|/usr|g' -e 
> 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' 
> ${srcdir}src/sysv/systemd/sssd-ssh.service.in 
> >src/sysv/systemd/sssd-ssh.service.tmp; mv 
> src/sysv/systemd/sssd-ssh.service.tmp src/sysv/systemd/sssd-ssh.service
> Makefile:47319: update target 'src/sysv/systemd/sssd-ssh.socket' due to: 
> target does not exist
> /usr/bin/mkdir -p src/sysv/systemd/
> Makefile:47315: update target 'src/sysv/systemd/sssd-pac.service' due to: 
> target does not exist
> /usr/bin/mkdir -p src/sysv/systemd/
> Makefile:47311: update target 'src/sysv/systemd/sssd-pac.socket' due to: 
> target does not exist
> /usr/bin/mkdir -p src/sysv/systemd/
> rm -f src/sysv/systemd/sssd-ssh.socket src/sysv/systemd/sssd-ssh.socket.tmp; 
> srcdir=''; test -f ./src/sysv/systemd/sssd-ssh.socket.in || srcdir=../; 
> /usr/bin/sed -e 's|@sbindir[@]|/usr/sbin|g' -e 
> 's|@environment_file[@]|/etc/default/sssd|g' -e 's|@localstatedir[@]|/var|g' 
> -e 's|@runstatedir[@]|/run|g' -e 's|@logpath[@]|/var/log/sssd|g' -e 
> 's|@libexecdir[@]|/usr/libexec|g' -e 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 
> 's|@prefix[@]|/usr|g' -e 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' 
> ${srcdir}src/sysv/systemd/sssd-ssh.socket.in 
> >src/sysv/systemd/sssd-ssh.socket.tmp; mv 
> src/sysv/systemd/sssd-ssh.socket.tmp src/sysv/systemd/sssd-ssh.socket
> rm -f src/sysv/systemd/sssd-pac.service 
> src/sysv/systemd/sssd-pac.service.tmp; srcdir=''; test -f 
> ./src/sysv/systemd/sssd-pac.service.in || srcdir=../; /usr/bin/sed -e 
> 's|@sbindir[@]|/usr/sbin|g' -e 's|@environment_file[@]|/etc/default/sssd|g' 
> -e 's|@localstatedir[@]|/var|g' -e 's|@runstatedir[@]|/run|g' -e 
> 's|@logpath[@]|/var/log/sssd|g' -e 's|@libexecdir[@]|/usr/libexec|g' -e 
> 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 's|@prefix[@]|/usr|g' -e 
> 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' 
> ${srcdir}src/sysv/systemd/sssd-pac.service.in 
> >src/sysv/systemd/sssd-pac.service.tmp; mv 
> src/sysv/systemd/sssd-pac.service.tmp src/sysv/systemd/sssd-pac.service
> rm -f src/sysv/systemd/sssd-pac.socket src/sysv/systemd/sssd-pac.socket.tmp; 
> srcdir=''; test -f ./src/sysv/systemd/sssd-pac.socket.in || srcdir=../; 
> /usr/bin/sed -e 's|@sbindir[@]|/usr/sbin|g' -e 
> 's|@environment_file[@]|/etc/default/sssd|g' -e 's|@localstatedir[@]|/var|g' 
> -e 's|@runstatedir[@]|/run|g' -e 's|@logpath[@]|/var/log/sssd|g' -e 
> 's|@libexecdir[@]|/usr/libexec|g' -e 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 
> 's|@prefix[@]|/usr|g' -e 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' 
> ${srcdir}src/sysv/systemd/sssd-pac.socket.in 
> >src/sysv/systemd/sssd-pac.socket.tmp; mv 
> src/sysv/systemd/sssd-pac.socket.tmp src/sysv/systemd/sssd-pac.socket
> Makefile:47307: update target 'src/sysv/systemd/sssd-ifp.service' due to: 
> target does not exist
> /usr/bin/mkdir -p src/sysv/systemd/
> Makefile:47303: update target 'src/sysv/systemd/sssd-autofs.service' due to: 
> target does not exist
> /usr/bin/mkdir -p src/sysv/systemd/
> Makefile:47299: update target 'src/sysv/systemd/sssd-autofs.socket' due to: 
> target does not exist
> /usr/bin/mkdir -p src/sysv/systemd/
> rm -f src/sysv/systemd/sssd-ifp.service 
> src/sysv/systemd/sssd-ifp.service.tmp; srcdir=''; test -f 
> ./src/sysv/systemd/sssd-ifp.service.in || srcdir=../; /usr/bin/sed -e 
> 's|@sbindir[@]|/usr/sbin|g' -e 's|@environment_file[@]|/etc/default/sssd|g' 
> -e 's|@localstatedir[@]|/var|g' -e 's|@runstatedir[@]|/run|g' -e 
> 's|@logpath[@]|/var/log/sssd|g' -e 's|@libexecdir[@]|/usr/libexec|g' -e 
> 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 's|@prefix[@]|/usr|g' -e 
> 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' -e 
> 's|@ifp_non_root_owner_policy[@]||g' -e 
> 's|@ifp_dbus_exec_cmd[@]|/usr/libexec/sssd/sssd_ifp --socket-activated|g' -e 
> 's|@ifp_dbus_exec_comment[@]|# If system is configured to use systemd ifp 
> service ("SystemdService=") then "Exec=" and "User=" options are not used|g' 
> -e 's|@ifp_systemdservice[@]|SystemdService=sssd-ifp.service|g' 
> ${srcdir}src/sysv/systemd/sssd-ifp.service.in 
> >src/sysv/systemd/sssd-ifp.service.tmp; mv 
> src/sysv/systemd/sssd-ifp.service.tmp src/sysv/systemd/sssd-ifp.service
> rm -f src/sysv/systemd/sssd-autofs.service 
> src/sysv/systemd/sssd-autofs.service.tmp; srcdir=''; test -f 
> ./src/sysv/systemd/sssd-autofs.service.in || srcdir=../; /usr/bin/sed -e 
> 's|@sbindir[@]|/usr/sbin|g' -e 's|@environment_file[@]|/etc/default/sssd|g' 
> -e 's|@localstatedir[@]|/var|g' -e 's|@runstatedir[@]|/run|g' -e 
> 's|@logpath[@]|/var/log/sssd|g' -e 's|@libexecdir[@]|/usr/libexec|g' -e 
> 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 's|@prefix[@]|/usr|g' -e 
> 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' 
> ${srcdir}src/sysv/systemd/sssd-autofs.service.in 
> >src/sysv/systemd/sssd-autofs.service.tmp; mv 
> src/sysv/systemd/sssd-autofs.service.tmp src/sysv/systemd/sssd-autofs.service
> rm -f src/sysv/systemd/sssd-autofs.socket 
> src/sysv/systemd/sssd-autofs.socket.tmp; srcdir=''; test -f 
> ./src/sysv/systemd/sssd-autofs.socket.in || srcdir=../; /usr/bin/sed -e 
> 's|@sbindir[@]|/usr/sbin|g' -e 's|@environment_file[@]|/etc/default/sssd|g' 
> -e 's|@localstatedir[@]|/var|g' -e 's|@runstatedir[@]|/run|g' -e 
> 's|@logpath[@]|/var/log/sssd|g' -e 's|@libexecdir[@]|/usr/libexec|g' -e 
> 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 's|@prefix[@]|/usr|g' -e 
> 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' 
> ${srcdir}src/sysv/systemd/sssd-autofs.socket.in 
> >src/sysv/systemd/sssd-autofs.socket.tmp; mv 
> src/sysv/systemd/sssd-autofs.socket.tmp src/sysv/systemd/sssd-autofs.socket
> Makefile:47295: update target 'src/sysv/systemd/sssd-pam.service' due to: 
> target does not exist
> /usr/bin/mkdir -p src/sysv/systemd/
> Makefile:47291: update target 'src/sysv/systemd/sssd-pam.socket' due to: 
> target does not exist
> /usr/bin/mkdir -p src/sysv/systemd/
> rm -f src/sysv/systemd/sssd-pam.service 
> src/sysv/systemd/sssd-pam.service.tmp; srcdir=''; test -f 
> ./src/sysv/systemd/sssd-pam.service.in || srcdir=../; /usr/bin/sed -e 
> 's|@sbindir[@]|/usr/sbin|g' -e 's|@environment_file[@]|/etc/default/sssd|g' 
> -e 's|@localstatedir[@]|/var|g' -e 's|@runstatedir[@]|/run|g' -e 
> 's|@logpath[@]|/var/log/sssd|g' -e 's|@libexecdir[@]|/usr/libexec|g' -e 
> 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 's|@prefix[@]|/usr|g' -e 
> 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' 
> ${srcdir}src/sysv/systemd/sssd-pam.service.in 
> >src/sysv/systemd/sssd-pam.service.tmp; mv 
> src/sysv/systemd/sssd-pam.service.tmp src/sysv/systemd/sssd-pam.service
> Makefile:47287: update target 'src/sysv/systemd/sssd-nss.service' due to: 
> target does not exist
> /usr/bin/mkdir -p src/sysv/systemd/
> rm -f src/sysv/systemd/sssd-pam.socket src/sysv/systemd/sssd-pam.socket.tmp; 
> srcdir=''; test -f ./src/sysv/systemd/sssd-pam.socket.in || srcdir=../; 
> /usr/bin/sed -e 's|@sbindir[@]|/usr/sbin|g' -e 
> 's|@environment_file[@]|/etc/default/sssd|g' -e 's|@localstatedir[@]|/var|g' 
> -e 's|@runstatedir[@]|/run|g' -e 's|@logpath[@]|/var/log/sssd|g' -e 
> 's|@libexecdir[@]|/usr/libexec|g' -e 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 
> 's|@prefix[@]|/usr|g' -e 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' 
> ${srcdir}src/sysv/systemd/sssd-pam.socket.in 
> >src/sysv/systemd/sssd-pam.socket.tmp; mv 
> src/sysv/systemd/sssd-pam.socket.tmp src/sysv/systemd/sssd-pam.socket
> rm -f src/sysv/systemd/sssd-nss.service 
> src/sysv/systemd/sssd-nss.service.tmp; srcdir=''; test -f 
> ./src/sysv/systemd/sssd-nss.service.in || srcdir=../; /usr/bin/sed -e 
> 's|@sbindir[@]|/usr/sbin|g' -e 's|@environment_file[@]|/etc/default/sssd|g' 
> -e 's|@localstatedir[@]|/var|g' -e 's|@runstatedir[@]|/run|g' -e 
> 's|@logpath[@]|/var/log/sssd|g' -e 's|@libexecdir[@]|/usr/libexec|g' -e 
> 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 's|@prefix[@]|/usr|g' -e 
> 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' 
> ${srcdir}src/sysv/systemd/sssd-nss.service.in 
> >src/sysv/systemd/sssd-nss.service.tmp; mv 
> src/sysv/systemd/sssd-nss.service.tmp src/sysv/systemd/sssd-nss.service
> Makefile:47283: update target 'src/sysv/systemd/sssd-nss.socket' due to: 
> target does not exist
> /usr/bin/mkdir -p src/sysv/systemd/
> Makefile:47279: update target 'src/sysv/systemd/sssd.service' due to: target 
> does not exist
> /usr/bin/mkdir -p src/sysv/systemd/
> rm -f src/sysv/systemd/sssd-nss.socket src/sysv/systemd/sssd-nss.socket.tmp; 
> srcdir=''; test -f ./src/sysv/systemd/sssd-nss.socket.in || srcdir=../; 
> /usr/bin/sed -e 's|@sbindir[@]|/usr/sbin|g' -e 
> 's|@environment_file[@]|/etc/default/sssd|g' -e 's|@localstatedir[@]|/var|g' 
> -e 's|@runstatedir[@]|/run|g' -e 's|@logpath[@]|/var/log/sssd|g' -e 
> 's|@libexecdir[@]|/usr/libexec|g' -e 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 
> 's|@prefix[@]|/usr|g' -e 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' 
> ${srcdir}src/sysv/systemd/sssd-nss.socket.in 
> >src/sysv/systemd/sssd-nss.socket.tmp; mv 
> src/sysv/systemd/sssd-nss.socket.tmp src/sysv/systemd/sssd-nss.socket
> rm -f src/sysv/systemd/sssd.service src/sysv/systemd/sssd.service.tmp; 
> srcdir=''; test -f ./src/sysv/systemd/sssd.service.in || srcdir=../; 
> /usr/bin/sed -e 's|@sbindir[@]|/usr/sbin|g' -e 
> 's|@environment_file[@]|/etc/default/sssd|g' -e 's|@localstatedir[@]|/var|g' 
> -e 's|@runstatedir[@]|/run|g' -e 's|@logpath[@]|/var/log/sssd|g' -e 
> 's|@libexecdir[@]|/usr/libexec|g' -e 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 
> 's|@prefix[@]|/usr|g' -e 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' 
> ${srcdir}src/sysv/systemd/sssd.service.in >src/sysv/systemd/sssd.service.tmp; 
> mv src/sysv/systemd/sssd.service.tmp src/sysv/systemd/sssd.service
> Makefile:47126: update target 
> 'src/responder/ifp/org.freedesktop.sssd.infopipe.service' due to: Makefile
> rm -f src/responder/ifp/org.freedesktop.sssd.infopipe.service 
> src/responder/ifp/org.freedesktop.sssd.infopipe.service.tmp; srcdir=''; test 
> -f ./src/responder/ifp/org.freedesktop.sssd.infopipe.service.in || 
> srcdir=../; /usr/bin/sed -e 's|@sbindir[@]|/usr/sbin|g' -e 
> 's|@environment_file[@]|/etc/default/sssd|g' -e 's|@localstatedir[@]|/var|g' 
> -e 's|@runstatedir[@]|/run|g' -e 's|@logpath[@]|/var/log/sssd|g' -e 
> 's|@libexecdir[@]|/usr/libexec|g' -e 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 
> 's|@prefix[@]|/usr|g' -e 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' -e 
> 's|@ifp_non_root_owner_policy[@]||g' -e 
> 's|@ifp_dbus_exec_cmd[@]|/usr/libexec/sssd/sssd_ifp --socket-activated|g' -e 
> 's|@ifp_dbus_exec_comment[@]|# If system is configured to use systemd ifp 
> service ("SystemdService=") then "Exec=" and "User=" options are not used|g' 
> -e 's|@ifp_systemdservice[@]|SystemdService=sssd-ifp.service|g' 
> ${srcdir}src/responder/ifp/org.freedesktop.sssd.infopipe.service.in 
> >src/responder/ifp/org.freedesktop.sssd.infopipe.service.tmp; mv 
> src/responder/ifp/org.freedesktop.sssd.infopipe.service.tmp 
> src/responder/ifp/org.freedesktop.sssd.infopipe.service
> Makefile:47129: update target 
> 'src/responder/ifp/org.freedesktop.sssd.infopipe.conf' due to: Makefile
> rm -f src/responder/ifp/org.freedesktop.sssd.infopipe.conf 
> src/responder/ifp/org.freedesktop.sssd.infopipe.conf.tmp; srcdir=''; test -f 
> ./src/responder/ifp/org.freedesktop.sssd.infopipe.conf.in || srcdir=../; 
> /usr/bin/sed -e 's|@sbindir[@]|/usr/sbin|g' -e 
> 's|@environment_file[@]|/etc/default/sssd|g' -e 's|@localstatedir[@]|/var|g' 
> -e 's|@runstatedir[@]|/run|g' -e 's|@logpath[@]|/var/log/sssd|g' -e 
> 's|@libexecdir[@]|/usr/libexec|g' -e 's|@pipepath[@]|/var/lib/sss/pipes|g' -e 
> 's|@prefix[@]|/usr|g' -e 's|@SSSD_USER[@]|root|g' -e 
> 's|@condconfigexists[@]|ConditionPathExists=\|/etc/sssd/sssd.conf\nConditionDirectoryNotEmpty=\|/etc/sssd/conf.d/|g'
>  -e 's|@capabilities[@]|CapabilityBoundingSet= CAP_SETGID CAP_SETUID 
> CAP_DAC_READ_SEARCH |g' -e 's|@nss_service_user_group[@]||g' -e 
> 's|@nss_socket_user_group[@]||g' -e 's|@supplementary_groups[@]|# Note: SSSD 
> package was built without support of running as non-privileged user|g' -e 
> 's|@sssdconfdir[@]|/etc/sssd|g' -e 's|@secdbpath[@]|/var/lib/sss/secrets|g' 
> -e 's|@dbpath[@]|/var/lib/sss/db|g' -e 
> 's|@gpocachepath[@]|/var/lib/sss/gpo_cache|g' -e 
> 's|@ifp_non_root_owner_policy[@]||g' -e 
> 's|@ifp_dbus_exec_cmd[@]|/usr/libexec/sssd/sssd_ifp --socket-activated|g' -e 
> 's|@ifp_dbus_exec_comment[@]|# If system is configured to use systemd ifp 
> service ("SystemdService=") then "Exec=" and "User=" options are not used|g' 
> -e 's|@ifp_systemdservice[@]|SystemdService=sssd-ifp.service|g' 
> ${srcdir}src/responder/ifp/org.freedesktop.sssd.infopipe.conf.in 
> >src/responder/ifp/org.freedesktop.sssd.infopipe.conf.tmp; mv 
> src/responder/ifp/org.freedesktop.sssd.infopipe.conf.tmp 
> src/responder/ifp/org.freedesktop.sssd.infopipe.conf
> Makefile:47343: update target 'src/tools/wrappers/sss_debuglevel' due to: 
> target does not exist
> /usr/bin/mkdir -p src/tools/wrappers/
> /bin/bash: line 1: 
> src/responder/ifp/org.freedesktop.sssd.infopipe.service.tmp: No such file or 
> directory
> mv: cannot stat 
> 'src/responder/ifp/org.freedesktop.sssd.infopipe.service.tmp': No such file 
> or directory
> make[3]: *** [Makefile:47126: 
> src/responder/ifp/org.freedesktop.sssd.infopipe.service] Error 1 
> shuffle=reverse


The full build log is available from:
http://qa-logs.debian.net/2025/05/05/shuffle/reverse/sssd_2.10.1-2_unstable_reverse.log

If you reassign this bug to another package, please mark it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

Reply via email to