Your message dated Sat, 28 May 2022 12:19:08 +0000
with message-id <e1nuvpq-0006n5...@fasolo.debian.org>
and subject line Bug#1004699: fixed in libdancer2-plugin-passphrase-perl 3.3.4-2
has caused the Debian Bug report #1004699,
regarding libdigest-bcrypt-perl breaks libdancer2-plugin-passphrase-perl 
autopkgtest: Bcrypt needs encoded text
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1004699: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004699
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: libdigest-bcrypt-perl, libdancer2-plugin-passphrase-perl
Control: found -1 libdigest-bcrypt-perl/1.212-1
Control: found -1 libdancer2-plugin-passphrase-perl/3.3.4-1
Severity: serious
Tags: sid bookworm
X-Debbugs-CC: debian...@lists.debian.org
User: debian...@lists.debian.org
Usertags: breaks needs-update

Dear maintainer(s),

With a recent upload of libdigest-bcrypt-perl the autopkgtest of libdancer2-plugin-passphrase-perl fails in testing when that autopkgtest is run with the binary packages of libdigest-bcrypt-perl from unstable. It passes when run with only packages from testing. In tabular form:

                                  pass            fail
libdigest-bcrypt-perl             from testing    1.212-1
libdancer2-plugin-passphrase-perl from testing    3.3.4-1
all others                        from testing    from testing

I copied some of the output at the bottom of this report.

Currently this regression is blocking the migration of libdigest-bcrypt-perl to testing [1]. Due to the nature of this issue, I filed this bug report against both packages. Can you please investigate the situation and reassign the bug to the right package?

More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=libdigest-bcrypt-perl

https://ci.debian.net/data/autopkgtest/testing/amd64/libd/libdancer2-plugin-passphrase-perl/18819128/log.gz

t/001_basics.t ...................... 1..1
ok 1 - use Dancer2::Plugin::Passphrase;
ok
t/003_default_settings.t ............ 1..3
ok 1 - RFC compliant hash generated
ok 2 - Match plaintext to hash
ok 3 - Incorrect passwords should be rejected
ok
t/004_all_algorithm_matching.t ...... 1..26
ok 1 - With Salt - Match plaintext to hash => MD5
ok 2 - With Salt - Incorrect passwords should be rejected => MD5
ok 3 - With Salt - Match plaintext to hash => SHA-1
ok 4 - With Salt - Incorrect passwords should be rejected => SHA-1
ok 5 - With Salt - Match plaintext to hash => SHA-224
ok 6 - With Salt - Incorrect passwords should be rejected => SHA-224
ok 7 - With Salt - Match plaintext to hash => SHA-256
ok 8 - With Salt - Incorrect passwords should be rejected => SHA-256
ok 9 - With Salt - Match plaintext to hash => SHA-384
ok 10 - With Salt - Incorrect passwords should be rejected => SHA-384
ok 11 - With Salt - Match plaintext to hash => SHA-512
ok 12 - With Salt - Incorrect passwords should be rejected => SHA-512
ok 13 - With Salt - Match plaintext to hash => Bcrypt
ok 14 - With Salt - Incorrect passwords should be rejected => Bcrypt
ok 15 - No Salt - Match plaintext to hash => MD5
ok 16 - No Salt - Incorrect passwords should be rejected => MD5
ok 17 - No Salt - Match plaintext to hash => SHA-1
ok 18 - No Salt - Incorrect passwords should be rejected => SHA-1
ok 19 - No Salt - Match plaintext to hash => SHA-224
ok 20 - No Salt - Incorrect passwords should be rejected => SHA-224
ok 21 - No Salt - Match plaintext to hash => SHA-256
ok 22 - No Salt - Incorrect passwords should be rejected => SHA-256
ok 23 - No Salt - Match plaintext to hash => SHA-384
ok 24 - No Salt - Incorrect passwords should be rejected => SHA-384
ok 25 - No Salt - Match plaintext to hash => SHA-512
ok 26 - No Salt - Incorrect passwords should be rejected => SHA-512
ok
t/005_random_passphrase.t ........... 1..3
ok 1 - Basic password generation
ok 2 - Custom password length
ok 3 - Custom chracter set
ok
t/006_return_object.t ............... 1..20
ok 1 - An object of class 'Dancer2::Plugin::Passphrase::Hashed' isa 'Dancer2::Plugin::Passphrase::Hashed'
ok 2 - Contains RFC 2307 representation
ok 3 - Contains correct scheme
ok 4 - Contains correct cost
ok 5 - Contains raw salt
ok 6 - Contains hex hash
ok 7 - Contains base64 hash
ok 8 - Contains raw salt
ok 9 - Contains hex salt
ok 10 - Contains base64 salt
ok 11 - Contains correct plaintext
ok 12 - Extracted raw salt is the same as the defined raw salt
ok 13 - Extracted base64 salt is the same as the defined base64 salt
ok 14 - Extracted hex salt is the same as the defined hex salt
ok 15 - Extracted raw hash is the same as the defined raw hash
ok 16 - Extracted base64 hash is the same as the defined base64 hash
ok 17 - Extracted hex hash is the same as the defined hex hash
ok 18 - Contains a defined, but empty raw salt
ok 19 - Contains a defined, but empty hex salt
ok 20 - Contains a defined, but empty base64 salt
ok
t/007_no_salt.t ..................... 1..2
ok 1 - Match plaintext to it's pre-computed hash
ok 2 - Match plaintext to it's generated hash
ok
t/008_unicode_matching.t ............ 1..8
ok 1 - UTF8 matches UTF8 for SHA-1
ok 2 - SHA-1 needs encoded text
ok 3 - UTF8 matches UTF8 for SHA-256
ok 4 - SHA-256 needs encoded text
ok 5 - UTF8 matches UTF8 for MD5
ok 6 - MD5 needs encoded text
ok 7 - UTF8 matches UTF8 for Bcrypt
not ok 8 - Bcrypt needs encoded text

#   Failed test 'Bcrypt needs encoded text'
#   at t/008_unicode_matching.t line 44.
# 'Wide character in subroutine entry at /usr/lib/x86_64-linux-gnu/perl5/5.32/Crypt/Bcrypt.pm line 21.
# '
#     doesn't match '(?^i:input must contain only octets)'
# Looks like you failed 1 test of 8.
Dubious, test returned 1 (wstat 256, 0x100)
Failed 1/8 subtests t/009_exception_handling.t .......... 1..2
ok 1 - Dies on invalid RFC 2307 string
ok 2 - Dies on almost valid RFC 2307 string
ok
t/011_alternative_bcrypt.t .......... 1..3
ok 1 - Matches $2a$ (ambiguous bcrypt)
ok 2 - Matches $2x$ (broken bcrypt)
ok 3 - Matches $2y$ (new standard bcrypt)
ok
t/013_hashes_generated_elsewhere.t .. 1..30
ok 1 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 2 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 3 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 4 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 5 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 6 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 7 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 8 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 9 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 10 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 11 - Authen::Passphrase Bcrypt hashes can be validated
ok 12 - Authen::Passphrase Bcrypt hashes can be validated
ok 13 - Authen::Passphrase Bcrypt hashes can be validated
ok 14 - Authen::Passphrase Bcrypt hashes can be validated
ok 15 - Authen::Passphrase Bcrypt hashes can be validated
ok 16 - Authen::Passphrase Bcrypt hashes can be validated
ok 17 - Authen::Passphrase Bcrypt hashes can be validated
ok 18 - Authen::Passphrase Bcrypt hashes can be validated
ok 19 - Authen::Passphrase Bcrypt hashes can be validated
ok 20 - Authen::Passphrase Bcrypt hashes can be validated
ok 21 - Ruby Bcrypt hashes can be validated
ok 22 - Ruby Bcrypt hashes can be validated
ok 23 - Ruby Bcrypt hashes can be validated
ok 24 - Ruby Bcrypt hashes can be validated
ok 25 - Ruby Bcrypt hashes can be validated
ok 26 - Ruby Bcrypt hashes can be validated
ok 27 - Ruby Bcrypt hashes can be validated
ok 28 - Ruby Bcrypt hashes can be validated
ok 29 - Ruby Bcrypt hashes can be validated
ok 30 - Ruby Bcrypt hashes can be validated
ok

Test Summary Report
-------------------
t/008_unicode_matching.t          (Wstat: 256 Tests: 8 Failed: 1)
  Failed test:  8
  Non-zero exit status: 1
Files=10, Tests=98, 4 wallclock secs ( 0.06 usr 0.00 sys + 3.94 cusr 0.33 csys = 4.33 CPU)
Result: FAIL
autopkgtest [23:11:12]: test autodep8-perl-build-deps

Attachment: OpenPGP_signature
Description: OpenPGP digital signature


--- End Message ---
--- Begin Message ---
Source: libdancer2-plugin-passphrase-perl
Source-Version: 3.3.4-2
Done: gregor herrmann <gre...@debian.org>

We believe that the bug you reported is fixed in the latest version of
libdancer2-plugin-passphrase-perl, which is due to be installed in the Debian 
FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1004...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
gregor herrmann <gre...@debian.org> (supplier of updated 
libdancer2-plugin-passphrase-perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 28 May 2022 13:57:01 +0200
Source: libdancer2-plugin-passphrase-perl
Architecture: source
Version: 3.3.4-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group <pkg-perl-maintain...@lists.alioth.debian.org>
Changed-By: gregor herrmann <gre...@debian.org>
Closes: 1004699
Changes:
 libdancer2-plugin-passphrase-perl (3.3.4-2) unstable; urgency=medium
 .
   * Team upload.
 .
   [ Debian Janitor ]
   * Remove constraints unnecessary since stretch:
     + Build-Depends-Indep: Drop versioned constraint on libdancer2-perl.
     + libdancer2-plugin-passphrase-perl: Drop versioned constraint on
       libdancer2-perl in Depends.
   * Bump debhelper from old 12 to 13.
   * Update standards version to 4.5.1, no changes needed.
 .
   [ gregor herrmann ]
   * Add patch from upstream Git repo for compatibility with
     Digest::Bcrypt >= 1.210. (Closes: #1004699)
   * Declare compliance with Debian Policy 4.6.1.
Checksums-Sha1:
 f04075af8dad1fc8df6e418facb529105e0e9d8a 2648 
libdancer2-plugin-passphrase-perl_3.3.4-2.dsc
 e62ceaa8b6b5dab5ffc30afd10589f4046b37fa1 6184 
libdancer2-plugin-passphrase-perl_3.3.4-2.debian.tar.xz
Checksums-Sha256:
 5859624f1c67055cf515aa8c7462c4f911b62f4ebc6795b6708e84a4aeac8e76 2648 
libdancer2-plugin-passphrase-perl_3.3.4-2.dsc
 1ff45843862b90377c62099876fb59c2ac88e9ef3c8f6cf9ff2eeca09de9cf40 6184 
libdancer2-plugin-passphrase-perl_3.3.4-2.debian.tar.xz
Files:
 9d40c8785b5d5fb2d80f95dff5ed14cc 2648 perl optional 
libdancer2-plugin-passphrase-perl_3.3.4-2.dsc
 84628fa019dcea7cbb3d6d7a21ad9d30 6184 perl optional 
libdancer2-plugin-passphrase-perl_3.3.4-2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=tIcp
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to