Your message dated Mon, 09 Jan 2017 17:04:23 +0000
with message-id <e1cqdmt-000dpm...@fasolo.debian.org>
and subject line Bug#848766: fixed in reel 0.6.1-4
has caused the Debian Bug report #848766,
regarding reel: FTBFS: ERROR: Test "ruby2.3" failed:      Failure/Error: 
response = http.request(request)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
848766: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848766
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: reel
Version: 0.6.1-3
Severity: serious
Tags: stretch sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20161219 qa-ftbfs
Justification: FTBFS on amd64

Hi,

During a rebuild of all packages in sid, your package failed to build on
amd64.

Relevant part (hopefully):
>      Failure/Error: response = http.request(request)
> 
>      OpenSSL::SSL::SSLError:
>        SSL_connect returned=1 errno=0 state=unknown state: sslv3 alert 
> unsupported certificate
>      # /usr/lib/ruby/2.3.0/net/http.rb:933:in `connect_nonblock'
>      # /usr/lib/ruby/2.3.0/net/http.rb:933:in `connect'
>      # /usr/lib/ruby/2.3.0/net/http.rb:863:in `do_start'
>      # /usr/lib/ruby/2.3.0/net/http.rb:852:in `start'
>      # /usr/lib/ruby/2.3.0/net/http.rb:1398:in `request'
>      # ./spec/reel/https_server_spec.rb:70:in `block (3 levels) in <top 
> (required)>'
>      # ./spec/reel/https_server_spec.rb:115:in `with_reel_https_server'
>      # ./spec/reel/https_server_spec.rb:62:in `block (2 levels) in <top 
> (required)>'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/example.rb:254:in `instance_exec'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/example.rb:254:in `block in run'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/example.rb:496:in `block in 
> with_around_and_singleton_context_hooks'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/example.rb:453:in `block in 
> with_around_example_hooks'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/hooks.rb:464:in `block in run'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/hooks.rb:602:in 
> `run_around_example_hooks_for'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/hooks.rb:464:in `run'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/example.rb:453:in 
> `with_around_example_hooks'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/example.rb:496:in 
> `with_around_and_singleton_context_hooks'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/example.rb:251:in `run'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/example_group.rb:627:in `block in 
> run_examples'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/example_group.rb:623:in `map'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/example_group.rb:623:in 
> `run_examples'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/example_group.rb:589:in `run'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/runner.rb:113:in `block (3 
> levels) in run_specs'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/runner.rb:113:in `map'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/runner.rb:113:in `block (2 
> levels) in run_specs'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/configuration.rb:1835:in 
> `with_suite_hooks'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/runner.rb:112:in `block in 
> run_specs'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/reporter.rb:77:in `report'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/runner.rb:111:in `run_specs'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/runner.rb:87:in `run'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/runner.rb:71:in `run'
>      # /usr/lib/ruby/vendor_ruby/rspec/core/runner.rb:45:in `invoke'
>      # /usr/bin/rspec:4:in `<main>'
> 
> Finished in 0.39121 seconds (files took 1.14 seconds to load)
> 48 examples, 1 failure, 2 pending
> 
> Failed examples:
> 
> rspec ./spec/reel/https_server_spec.rb:47 # Reel::Server::HTTPS verifies 
> client SSL certs when provided with a CA
> 
> Randomized with seed 47163
> 
> /usr/bin/ruby2.3 /usr/bin/rspec --pattern ./spec/\*\*/\*_spec.rb --format 
> documentation failed
> ERROR: Test "ruby2.3" failed: 

The full build log is available from:
   http://aws-logs.debian.net/2016/12/19/reel_0.6.1-3_unstable.log

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.

--- End Message ---
--- Begin Message ---
Source: reel
Source-Version: 0.6.1-4

We believe that the bug you reported is fixed in the latest version of
reel, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 848...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Micah Anderson <mi...@debian.org> (supplier of updated reel package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 09 Jan 2017 11:46:16 -0500
Source: reel
Binary: reel
Architecture: source
Version: 0.6.1-4
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers 
<pkg-ruby-extras-maintain...@lists.alioth.debian.org>
Changed-By: Micah Anderson <mi...@debian.org>
Description:
 reel       - Celluloid::IO-powered HTTP server
Closes: 848766
Changes:
 reel (0.6.1-4) unstable; urgency=medium
 .
   * update patch: add missing v3 extended key usage flags
     to fix broken test (Closes: #848766)
Checksums-Sha1:
 0de426702490d9c4ff3099b7d00ec85f184e7c08 2318 reel_0.6.1-4.dsc
 0a4df120f5940079b6b3ba435a05d336ca215cb1 3852 reel_0.6.1-4.debian.tar.xz
Checksums-Sha256:
 2b9803902cec358f8f99c5d6b8786875e8a29ff1ff28da8e8fc2f09827f18990 2318 
reel_0.6.1-4.dsc
 51979d56105b3e4cff7a59500a382e8ca71012508f6ed21efbd651c518b9121d 3852 
reel_0.6.1-4.debian.tar.xz
Files:
 5398c51f47fa7aea632aaca4b58d3564 2318 ruby optional reel_0.6.1-4.dsc
 b86e4c6ad92ba94628ff89e1b2848783 3852 ruby optional reel_0.6.1-4.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=aLZW
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to