Your message dated Sat, 28 May 2022 12:19:08 +0000 with message-id <e1nuvpq-0006n5...@fasolo.debian.org> and subject line Bug#1004699: fixed in libdancer2-plugin-passphrase-perl 3.3.4-2 has caused the Debian Bug report #1004699, regarding libdigest-bcrypt-perl breaks libdancer2-plugin-passphrase-perl autopkgtest: Bcrypt needs encoded text to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1004699: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004699 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Source: libdigest-bcrypt-perl, libdancer2-plugin-passphrase-perl Control: found -1 libdigest-bcrypt-perl/1.212-1 Control: found -1 libdancer2-plugin-passphrase-perl/3.3.4-1 Severity: serious Tags: sid bookworm X-Debbugs-CC: debian...@lists.debian.org User: debian...@lists.debian.org Usertags: breaks needs-update Dear maintainer(s),With a recent upload of libdigest-bcrypt-perl the autopkgtest of libdancer2-plugin-passphrase-perl fails in testing when that autopkgtest is run with the binary packages of libdigest-bcrypt-perl from unstable. It passes when run with only packages from testing. In tabular form:pass fail libdigest-bcrypt-perl from testing 1.212-1 libdancer2-plugin-passphrase-perl from testing 3.3.4-1 all others from testing from testing I copied some of the output at the bottom of this report.Currently this regression is blocking the migration of libdigest-bcrypt-perl to testing [1]. Due to the nature of this issue, I filed this bug report against both packages. Can you please investigate the situation and reassign the bug to the right package?More information about this bug and the reason for filing it can be found on https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation Paul [1] https://qa.debian.org/excuses.php?package=libdigest-bcrypt-perl https://ci.debian.net/data/autopkgtest/testing/amd64/libd/libdancer2-plugin-passphrase-perl/18819128/log.gz t/001_basics.t ...................... 1..1 ok 1 - use Dancer2::Plugin::Passphrase; ok t/003_default_settings.t ............ 1..3 ok 1 - RFC compliant hash generated ok 2 - Match plaintext to hash ok 3 - Incorrect passwords should be rejected ok t/004_all_algorithm_matching.t ...... 1..26 ok 1 - With Salt - Match plaintext to hash => MD5 ok 2 - With Salt - Incorrect passwords should be rejected => MD5 ok 3 - With Salt - Match plaintext to hash => SHA-1 ok 4 - With Salt - Incorrect passwords should be rejected => SHA-1 ok 5 - With Salt - Match plaintext to hash => SHA-224 ok 6 - With Salt - Incorrect passwords should be rejected => SHA-224 ok 7 - With Salt - Match plaintext to hash => SHA-256 ok 8 - With Salt - Incorrect passwords should be rejected => SHA-256 ok 9 - With Salt - Match plaintext to hash => SHA-384 ok 10 - With Salt - Incorrect passwords should be rejected => SHA-384 ok 11 - With Salt - Match plaintext to hash => SHA-512 ok 12 - With Salt - Incorrect passwords should be rejected => SHA-512 ok 13 - With Salt - Match plaintext to hash => Bcrypt ok 14 - With Salt - Incorrect passwords should be rejected => Bcrypt ok 15 - No Salt - Match plaintext to hash => MD5 ok 16 - No Salt - Incorrect passwords should be rejected => MD5 ok 17 - No Salt - Match plaintext to hash => SHA-1 ok 18 - No Salt - Incorrect passwords should be rejected => SHA-1 ok 19 - No Salt - Match plaintext to hash => SHA-224 ok 20 - No Salt - Incorrect passwords should be rejected => SHA-224 ok 21 - No Salt - Match plaintext to hash => SHA-256 ok 22 - No Salt - Incorrect passwords should be rejected => SHA-256 ok 23 - No Salt - Match plaintext to hash => SHA-384 ok 24 - No Salt - Incorrect passwords should be rejected => SHA-384 ok 25 - No Salt - Match plaintext to hash => SHA-512 ok 26 - No Salt - Incorrect passwords should be rejected => SHA-512 ok t/005_random_passphrase.t ........... 1..3 ok 1 - Basic password generation ok 2 - Custom password length ok 3 - Custom chracter set ok t/006_return_object.t ............... 1..20ok 1 - An object of class 'Dancer2::Plugin::Passphrase::Hashed' isa 'Dancer2::Plugin::Passphrase::Hashed'ok 2 - Contains RFC 2307 representation ok 3 - Contains correct scheme ok 4 - Contains correct cost ok 5 - Contains raw salt ok 6 - Contains hex hash ok 7 - Contains base64 hash ok 8 - Contains raw salt ok 9 - Contains hex salt ok 10 - Contains base64 salt ok 11 - Contains correct plaintext ok 12 - Extracted raw salt is the same as the defined raw salt ok 13 - Extracted base64 salt is the same as the defined base64 salt ok 14 - Extracted hex salt is the same as the defined hex salt ok 15 - Extracted raw hash is the same as the defined raw hash ok 16 - Extracted base64 hash is the same as the defined base64 hash ok 17 - Extracted hex hash is the same as the defined hex hash ok 18 - Contains a defined, but empty raw salt ok 19 - Contains a defined, but empty hex salt ok 20 - Contains a defined, but empty base64 salt ok t/007_no_salt.t ..................... 1..2 ok 1 - Match plaintext to it's pre-computed hash ok 2 - Match plaintext to it's generated hash ok t/008_unicode_matching.t ............ 1..8 ok 1 - UTF8 matches UTF8 for SHA-1 ok 2 - SHA-1 needs encoded text ok 3 - UTF8 matches UTF8 for SHA-256 ok 4 - SHA-256 needs encoded text ok 5 - UTF8 matches UTF8 for MD5 ok 6 - MD5 needs encoded text ok 7 - UTF8 matches UTF8 for Bcrypt not ok 8 - Bcrypt needs encoded text # Failed test 'Bcrypt needs encoded text' # at t/008_unicode_matching.t line 44.# 'Wide character in subroutine entry at /usr/lib/x86_64-linux-gnu/perl5/5.32/Crypt/Bcrypt.pm line 21.# ' # doesn't match '(?^i:input must contain only octets)' # Looks like you failed 1 test of 8. Dubious, test returned 1 (wstat 256, 0x100) Failed 1/8 subtests t/009_exception_handling.t .......... 1..2 ok 1 - Dies on invalid RFC 2307 string ok 2 - Dies on almost valid RFC 2307 string ok t/011_alternative_bcrypt.t .......... 1..3 ok 1 - Matches $2a$ (ambiguous bcrypt) ok 2 - Matches $2x$ (broken bcrypt) ok 3 - Matches $2y$ (new standard bcrypt) ok t/013_hashes_generated_elsewhere.t .. 1..30 ok 1 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 2 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 3 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 4 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 5 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 6 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 7 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 8 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 9 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 10 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 11 - Authen::Passphrase Bcrypt hashes can be validated ok 12 - Authen::Passphrase Bcrypt hashes can be validated ok 13 - Authen::Passphrase Bcrypt hashes can be validated ok 14 - Authen::Passphrase Bcrypt hashes can be validated ok 15 - Authen::Passphrase Bcrypt hashes can be validated ok 16 - Authen::Passphrase Bcrypt hashes can be validated ok 17 - Authen::Passphrase Bcrypt hashes can be validated ok 18 - Authen::Passphrase Bcrypt hashes can be validated ok 19 - Authen::Passphrase Bcrypt hashes can be validated ok 20 - Authen::Passphrase Bcrypt hashes can be validated ok 21 - Ruby Bcrypt hashes can be validated ok 22 - Ruby Bcrypt hashes can be validated ok 23 - Ruby Bcrypt hashes can be validated ok 24 - Ruby Bcrypt hashes can be validated ok 25 - Ruby Bcrypt hashes can be validated ok 26 - Ruby Bcrypt hashes can be validated ok 27 - Ruby Bcrypt hashes can be validated ok 28 - Ruby Bcrypt hashes can be validated ok 29 - Ruby Bcrypt hashes can be validated ok 30 - Ruby Bcrypt hashes can be validated ok Test Summary Report ------------------- t/008_unicode_matching.t (Wstat: 256 Tests: 8 Failed: 1) Failed test: 8 Non-zero exit status: 1Files=10, Tests=98, 4 wallclock secs ( 0.06 usr 0.00 sys + 3.94 cusr 0.33 csys = 4.33 CPU)Result: FAIL autopkgtest [23:11:12]: test autodep8-perl-build-depsOpenPGP_signature
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---Source: libdancer2-plugin-passphrase-perl Source-Version: 3.3.4-2 Done: gregor herrmann <gre...@debian.org> We believe that the bug you reported is fixed in the latest version of libdancer2-plugin-passphrase-perl, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1004...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. gregor herrmann <gre...@debian.org> (supplier of updated libdancer2-plugin-passphrase-perl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 28 May 2022 13:57:01 +0200 Source: libdancer2-plugin-passphrase-perl Architecture: source Version: 3.3.4-2 Distribution: unstable Urgency: medium Maintainer: Debian Perl Group <pkg-perl-maintain...@lists.alioth.debian.org> Changed-By: gregor herrmann <gre...@debian.org> Closes: 1004699 Changes: libdancer2-plugin-passphrase-perl (3.3.4-2) unstable; urgency=medium . * Team upload. . [ Debian Janitor ] * Remove constraints unnecessary since stretch: + Build-Depends-Indep: Drop versioned constraint on libdancer2-perl. + libdancer2-plugin-passphrase-perl: Drop versioned constraint on libdancer2-perl in Depends. * Bump debhelper from old 12 to 13. * Update standards version to 4.5.1, no changes needed. . [ gregor herrmann ] * Add patch from upstream Git repo for compatibility with Digest::Bcrypt >= 1.210. (Closes: #1004699) * Declare compliance with Debian Policy 4.6.1. Checksums-Sha1: f04075af8dad1fc8df6e418facb529105e0e9d8a 2648 libdancer2-plugin-passphrase-perl_3.3.4-2.dsc e62ceaa8b6b5dab5ffc30afd10589f4046b37fa1 6184 libdancer2-plugin-passphrase-perl_3.3.4-2.debian.tar.xz Checksums-Sha256: 5859624f1c67055cf515aa8c7462c4f911b62f4ebc6795b6708e84a4aeac8e76 2648 libdancer2-plugin-passphrase-perl_3.3.4-2.dsc 1ff45843862b90377c62099876fb59c2ac88e9ef3c8f6cf9ff2eeca09de9cf40 6184 libdancer2-plugin-passphrase-perl_3.3.4-2.debian.tar.xz Files: 9d40c8785b5d5fb2d80f95dff5ed14cc 2648 perl optional libdancer2-plugin-passphrase-perl_3.3.4-2.dsc 84628fa019dcea7cbb3d6d7a21ad9d30 6184 perl optional libdancer2-plugin-passphrase-perl_3.3.4-2.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEE0eExbpOnYKgQTYX6uzpoAYZJqgYFAmKSDqFfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEQx RTEzMTZFOTNBNzYwQTgxMDREODVGQUJCM0E2ODAxODY0OUFBMDYACgkQuzpoAYZJ qgZRRA/8CRtrwU6kyl0NzCjmnerhk8afqns3bQ6hS/DNmsr680UFMdi7uK0J9Egs gb8fUUI0I6YEWVELdBH+BsXwxaWr1fSGZjFZZXB8jxE+5acUA61Ob79FWzni8vl2 14vvQybvyvFWfO9Tyck20cLk6CGBHHWHKvYD25Qav+GEqiQS6VvgWOSDLpqo8TAF o1U1ezpbFtyEqFJ3tEFXRIiOpWvzQnzrYNQE8lMJ4yL6fWFR9DFMg0E0/hK35Tm+ 5XfGDIa4T014oplt63hWu5fu4E+ttax8AU5kgQJSRmmBpmwwFfbZd5u8cbBn2FAX mLR1cKoI8YOTilB6kyN6Pn2OyuPxdqJFYX2PCksBUHiXSgMoKVMhpE9qFO0LC69k Bw/hoF7VU3BSWYQL+cv0FFXvF9wRH0ebNRjNGp/gVEWBpqzAD4AgUDE/potOJ1LW s+qw7yzQJ2GzZcByJ8v/KvAFAWCpcsSmnNNys39oSoWpLxuLdfqlPNtE8IMG2oNP J95VySerKSi65uHBOpm7wJn0FBFrxdOnQ1aSwxVRFz/AEvOWL4ysKVYCEZmFrKkB CF2sS5sA5erKQMxW5oaXgr92Q/sxNQ0vWY0gUn+JPBUbTLmX2yaCRq14XCdfTE2r FDDSOR3YHq27CU2sKdokQI15IdYbMqrEIdQmSPuWZxySVCbeHfE= =tIcp -----END PGP SIGNATURE-----
--- End Message ---