Your message dated Sat, 28 Dec 2019 23:04:53 +0000
with message-id <e1ill8f-000d2q...@fasolo.debian.org>
and subject line Bug#865800: fixed in golang-github-smartystreets-go-aws-auth 
1.0.0-1
has caused the Debian Bug report #865800,
regarding golang-github-smartystreets-go-aws-auth FTBFS: test failure
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
865800: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865800
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: golang-github-smartystreets-go-aws-auth
Version: 0.0~git20160722.0.2043e6d-1
Severity: serious
Tags: buster sid

Some recent change in unstable makes golang-github-smartystreets-go-aws-auth 
FTBFS:

https://tests.reproducible-builds.org/debian/history/golang-github-smartystreets-go-aws-auth.html
https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/golang-github-smartystreets-go-aws-auth.html

...

   dh_auto_test -O--buildsystem=golang
        go test -v -p 16 github.com/smartystreets/go-aws-auth
=== RUN   TestIntegration

  Given real credentials from environment variables 
    A request (with out-of-order query string) with to IAM should succeed 
(assuming Administrator Access policy) ⚠
    A request to S3 should succeed ⚠
    A request to EC2 should succeed ⚠
    A request to SQS should succeed ⚠
    A request to SES should succeed ⚠
    A request to Route 53 should succeed ⚠
    A request to SimpleDB should succeed ⚠
    If S3Resource env variable is set 
      A URL-signed request to that S3 resource should succeed ⚠


0 total assertions (one or more sections skipped)

--- PASS: TestIntegration (0.01s)
=== RUN   TestSign

  Requests to services using Version 2 should be signed accordingly ✔✔


2 total assertions (one or more sections skipped)


  Requests to services using Version 3 should be signed accordingly ✔✔


4 total assertions (one or more sections skipped)


  Requests to services using Version 4 should be signed accordingly ✔✔✔


7 total assertions (one or more sections skipped)


  Requests to services using existing credentials Version 2 should be signed 
accordingly ✔✔


9 total assertions (one or more sections skipped)


  Requests to services using existing credentials Version 3 should be signed 
accordingly ✔✔


11 total assertions (one or more sections skipped)


  Requests to services using existing credentials Version 4 should be signed 
accordingly ✔✔✔


14 total assertions (one or more sections skipped)

--- PASS: TestSign (0.00s)
=== RUN   TestExpiration

  Credentials without an expiration can't expire ✔


15 total assertions (one or more sections skipped)


  Credentials that expire in 5 minutes aren't expired ✔


16 total assertions (one or more sections skipped)


  Credentials that expire in 1 minute are expired ✔


17 total assertions (one or more sections skipped)


  Credentials that expired 2 hours ago are expired ✔


18 total assertions (one or more sections skipped)

--- PASS: TestExpiration (0.00s)
=== RUN   TestCommonFunctions

  Service and region should be properly extracted from host strings 
✔✔✔✔✔✔✔✔✔✔✔✔✔✔


32 total assertions (one or more sections skipped)


  MD5 hashes should be properly computed and base-64 encoded ✔


33 total assertions (one or more sections skipped)


  SHA-256 hashes should be properly hex-encoded (base 16) ✔


34 total assertions (one or more sections skipped)


  Given a key and contents 
    HMAC-SHA256 should be properly computed ✔
    HMAC-SHA1 should be properly computed ✔


36 total assertions (one or more sections skipped)


  Strings should be properly concatenated with a delimiter ✔✔✔


39 total assertions (one or more sections skipped)


  URI components should be properly encoded ✔✔✔


42 total assertions (one or more sections skipped)


  URI query strings should be properly encoded ✔


43 total assertions (one or more sections skipped)

--- PASS: TestCommonFunctions (0.00s)
=== RUN   TestSignatureS3

  Given a GET request to Amazon S3 
    The request should be prepared with a Date header ✔
    The CanonicalizedAmzHeaders should be built properly ✔
    The CanonicalizedResource should be built properly ✔
    The string to sign should be correct ✔
    The final signature string should be exactly correct ✔


48 total assertions (one or more sections skipped)


  Given a GET request for a resource on S3 for query string authentication 
    The string to sign should be correct ✔
    The signature of string to sign should be correct ✔
    The finished signed URL should be correct ✔


51 total assertions (one or more sections skipped)

--- PASS: TestSignatureS3 (0.00s)
=== RUN   TestS3STSRequestPreparer

  Given a plain request with no custom headers 
    And a set of credentials with an STS token 
      It should include an X-Amz-Security-Token when the request is signed ✔✔


53 total assertions (one or more sections skipped)

--- PASS: TestS3STSRequestPreparer (0.00s)
=== RUN   TestCanonical
--- PASS: TestCanonical (0.00s)
=== RUN   TestSignature2

  Given bogus credentials 
    Given a plain request that is unprepared 
      The request should be prepared to be signed ✔
    Given a prepared, but unsigned, request 
      The canonical query string should be correct ✔
      The absolute path should be extracted correctly ✔
      The string to sign should be well-formed ✔
      The resulting signature should be correct ✔
      The final signed request should be correctly formed ✔


59 total assertions (one or more sections skipped)

--- PASS: TestSignature2 (0.00s)
=== RUN   TestVersion2STSRequestPreparer

  Given a plain request 
    And a set of credentials with an STS token 
      It should include the SecurityToken parameter when the request is signed 
✔✔


61 total assertions (one or more sections skipped)

--- PASS: TestVersion2STSRequestPreparer (0.00s)
=== RUN   TestSignature3

  Given bogus credentials 
    Given a plain request that is unprepared 
      The request should be prepared to be signed ✔
    Given a prepared, but unsigned, request 
      The absolute path should be extracted correctly ✔
      The string to sign should be well-formed ✔
      The resulting signature should be correct ✔
      The final signed request should be correctly formed ✔


66 total assertions (one or more sections skipped)

--- PASS: TestSignature3 (0.00s)
=== RUN   TestVersion3STSRequestPreparer

  Given a plain request with no custom headers 
    And a set of credentials with an STS token 
      It should include an X-Amz-Security-Token when the request is signed ✔✔


68 total assertions (one or more sections skipped)

--- PASS: TestVersion3STSRequestPreparer (0.00s)
=== RUN   TestVersion4RequestPreparer

  Given a plain request with no custom headers 
    The necessary, default headers should be appended ✘
    Forward-slash should be appended to URI if not present ✔
    And a set of credentials 
      It should be signed with an Authorization header ✔✔✔✔✔


Failures:

  * 
/build/1st/golang-github-smartystreets-go-aws-auth-0.0~git20160722.0.2043e6d/obj-x86_64-linux-gnu/src/github.com/smartystreets/go-aws-auth/sign4_test.go
 
  Line 21:
  Expected: '(*http.Request){Method:"POST", URL:(*url.URL){Scheme:"http", 
Opaque:"", User:(*url.Userinfo)(nil), Host:"iam.amazonaws.com", Path:"/", 
RawPath:"", ForceQuery:false, RawQuery:"", Fragment:""}, Proto:"HTTP/1.1", 
ProtoMajor:1, ProtoMinor:1, 
Header:http.Header{"Content-Type":[]string{"application/x-www-form-urlencoded; 
charset=utf-8"}, "X-Amz-Date":[]string{"20080814T170848Z"}}, 
Body:ioutil.nopCloser{Reader:(*strings.Reader){s:"Action=ListUsers&Version=2010-05-08",
 i:0, prevRune:-1}}, GetBody:(func() (io.ReadCloser, 
error))(0x0000000000634960), ContentLength:35, TransferEncoding:[]string(nil), 
Close:false, Host:"iam.amazonaws.com", Form:url.Values(nil), 
PostForm:url.Values(nil), MultipartForm:(*multipart.Form)(nil), 
Trailer:http.Header(nil), RemoteAddr:"", RequestURI:"", 
TLS:(*tls.ConnectionState)(nil), Cancel:(<-chan struct {})(0x0000000000000000), 
Response:(*http.Response)(nil), ctx:context.Context(nil)}'
  Actual:   '(*http.Request){Method:"POST", URL:(*url.URL){Scheme:"http", 
Opaque:"", User:(*url.Userinfo)(nil), Host:"iam.amazonaws.com", Path:"/", 
RawPath:"", ForceQuery:false, RawQuery:"", Fragment:""}, Proto:"HTTP/1.1", 
ProtoMajor:1, ProtoMinor:1, 
Header:http.Header{"Content-Type":[]string{"application/x-www-form-urlencoded; 
charset=utf-8"}, "X-Amz-Date":[]string{"20080814T170848Z"}}, 
Body:ioutil.nopCloser{Reader:(*strings.Reader){s:"Action=ListUsers&Version=2010-05-08",
 i:0, prevRune:-1}}, GetBody:(func() (io.ReadCloser, 
error))(0x0000000000634960), ContentLength:35, TransferEncoding:[]string(nil), 
Close:false, Host:"iam.amazonaws.com", Form:url.Values(nil), 
PostForm:url.Values(nil), MultipartForm:(*multipart.Form)(nil), 
Trailer:http.Header(nil), RemoteAddr:"", RequestURI:"", 
TLS:(*tls.ConnectionState)(nil), Cancel:(<-chan struct {})(0x0000000000000000), 
Response:(*http.Response)(nil), ctx:context.Context(nil)}'
  (Should resemble)!


75 total assertions (one or more sections skipped)


  Given a request with custom, necessary headers 
    The custom, necessary headers must not be changed ✘


Failures:

  * 
/build/1st/golang-github-smartystreets-go-aws-auth-0.0~git20160722.0.2043e6d/obj-x86_64-linux-gnu/src/github.com/smartystreets/go-aws-auth/sign4_test.go
 
  Line 50:
  Expected: '(*http.Request){Method:"POST", URL:(*url.URL){Scheme:"http", 
Opaque:"", User:(*url.Userinfo)(nil), Host:"iam.amazonaws.com", Path:"/", 
RawPath:"", ForceQuery:false, RawQuery:"", Fragment:""}, Proto:"HTTP/1.1", 
ProtoMajor:1, ProtoMinor:1, 
Header:http.Header{"Content-Type":[]string{"application/x-www-form-urlencoded; 
charset=utf-8"}, "X-Amz-Date":[]string{"20110909T233600Z"}}, 
Body:ioutil.nopCloser{Reader:(*strings.Reader){s:"Action=ListUsers&Version=2010-05-08",
 i:0, prevRune:-1}}, GetBody:(func() (io.ReadCloser, 
error))(0x0000000000634960), ContentLength:35, TransferEncoding:[]string(nil), 
Close:false, Host:"iam.amazonaws.com", Form:url.Values(nil), 
PostForm:url.Values(nil), MultipartForm:(*multipart.Form)(nil), 
Trailer:http.Header(nil), RemoteAddr:"", RequestURI:"", 
TLS:(*tls.ConnectionState)(nil), Cancel:(<-chan struct {})(0x0000000000000000), 
Response:(*http.Response)(nil), ctx:context.Context(nil)}'
  Actual:   '(*http.Request){Method:"POST", URL:(*url.URL){Scheme:"http", 
Opaque:"", User:(*url.Userinfo)(nil), Host:"iam.amazonaws.com", Path:"/", 
RawPath:"", ForceQuery:false, RawQuery:"", Fragment:""}, Proto:"HTTP/1.1", 
ProtoMajor:1, ProtoMinor:1, 
Header:http.Header{"Content-Type":[]string{"application/x-www-form-urlencoded; 
charset=utf-8"}, "X-Amz-Date":[]string{"20110909T233600Z"}}, 
Body:ioutil.nopCloser{Reader:(*strings.Reader){s:"Action=ListUsers&Version=2010-05-08",
 i:0, prevRune:-1}}, GetBody:(func() (io.ReadCloser, 
error))(0x0000000000634960), ContentLength:35, TransferEncoding:[]string(nil), 
Close:false, Host:"iam.amazonaws.com", Form:url.Values(nil), 
PostForm:url.Values(nil), MultipartForm:(*multipart.Form)(nil), 
Trailer:http.Header(nil), RemoteAddr:"", RequestURI:"", 
TLS:(*tls.ConnectionState)(nil), Cancel:(<-chan struct {})(0x0000000000000000), 
Response:(*http.Response)(nil), ctx:context.Context(nil)}'
  (Should resemble)!


76 total assertions (one or more sections skipped)

--- FAIL: TestVersion4RequestPreparer (0.01s)
=== RUN   TestVersion4STSRequestPreparer

  Given a plain request with no custom headers 
    And a set of credentials with an STS token 
      It should include an X-Amz-Security-Token when the request is signed ✔✔


78 total assertions (one or more sections skipped)

--- PASS: TestVersion4STSRequestPreparer (0.00s)
=== RUN   TestVersion4SigningTasks

  Given a bogus request and credentials from AWS documentation with an 
additional meta tag 
    (Task 1) The canonical request should be built correctly ✔
    (Task 2) The string to sign should be built correctly ✔
    (Task 3) The version 4 signed signature should be correct ✔


81 total assertions (one or more sections skipped)

--- PASS: TestVersion4SigningTasks (0.00s)
=== RUN   TestSignature4Helpers

  The signing key should be properly generated ✔


82 total assertions (one or more sections skipped)


  Authorization headers should be built properly ✔


83 total assertions (one or more sections skipped)


  Timestamps should be in the correct format, in UTC time ✔✔✔✔✔✔


89 total assertions (one or more sections skipped)


  Given an Version 4 AWS-formatted timestamp 
    The date string should be extracted properly ✔


90 total assertions (one or more sections skipped)


  Given any request with a body 
    Its body should be read and replaced without differences ✔✔


92 total assertions (one or more sections skipped)

--- PASS: TestSignature4Helpers (0.00s)
FAIL
exit status 1
FAIL    github.com/smartystreets/go-aws-auth    0.048s
dh_auto_test: go test -v -p 16 github.com/smartystreets/go-aws-auth returned 
exit code 1
debian/rules:4: recipe for target 'build' failed
make: *** [build] Error 1

--- End Message ---
--- Begin Message ---
Source: golang-github-smartystreets-go-aws-auth
Source-Version: 1.0.0-1

We believe that the bug you reported is fixed in the latest version of
golang-github-smartystreets-go-aws-auth, which is due to be installed in the 
Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 865...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Dmitry Smirnov <only...@debian.org> (supplier of updated 
golang-github-smartystreets-go-aws-auth package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sun, 29 Dec 2019 09:44:29 +1100
Source: golang-github-smartystreets-go-aws-auth
Architecture: source
Version: 1.0.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Go Packaging Team 
<pkg-go-maintain...@lists.alioth.debian.org>
Changed-By: Dmitry Smirnov <only...@debian.org>
Closes: 865800
Changes:
 golang-github-smartystreets-go-aws-auth (1.0.0-1) unstable; urgency=medium
 .
   * Team upload
 .
   [ Alexandre Viau ]
   * Point Vcs-* urls to salsa.debian.org.
 .
   [ Dmitry Smirnov ]
   * New upstream release
     + fixed test failure (Closes: #865800).
   * Priority: optional; Standards-Version: 4.4.1
   * Testsuite: autopkgtest-pkg-go
   * DH to version 12
   * (Build-)Depends:
     + golang-github-smartystreets-gunit-dev
Checksums-Sha1:
 03a9030f30f4d0e74f80c23c6498002535813ae3 2458 
golang-github-smartystreets-go-aws-auth_1.0.0-1.dsc
 f9561be6ed909c4f806595e3c05a6ddf67cdceac 14388 
golang-github-smartystreets-go-aws-auth_1.0.0.orig.tar.xz
 2bdb6535a231d649ff7ef876aa1311ee377a004d 2872 
golang-github-smartystreets-go-aws-auth_1.0.0-1.debian.tar.xz
 3194b277225c45311120fdd5593b1ffe02d5535d 6654 
golang-github-smartystreets-go-aws-auth_1.0.0-1_amd64.buildinfo
Checksums-Sha256:
 d17688c7c059396370d812742cbf23c3b01065064da9bc35f648e91628b8b0dd 2458 
golang-github-smartystreets-go-aws-auth_1.0.0-1.dsc
 8d7c5a4864892cfcbe7f91037dd294799c762fff4517611b7b4795461bee5514 14388 
golang-github-smartystreets-go-aws-auth_1.0.0.orig.tar.xz
 38919e330b9e8a36bbebd7241b0bdf85f5c32638932a8c7665473ff7263d3161 2872 
golang-github-smartystreets-go-aws-auth_1.0.0-1.debian.tar.xz
 72195d00dc7d6b0664f9b7cd7686eb11110d62f740a32e360f7a20e76c44b5f0 6654 
golang-github-smartystreets-go-aws-auth_1.0.0-1_amd64.buildinfo
Files:
 18464d8c1606560f74e376694d85bf39 2458 devel optional 
golang-github-smartystreets-go-aws-auth_1.0.0-1.dsc
 d74abfaa4c561cfd90e1a88756131bdf 14388 devel optional 
golang-github-smartystreets-go-aws-auth_1.0.0.orig.tar.xz
 13a541de67bfc5321d1db17167da02fc 2872 devel optional 
golang-github-smartystreets-go-aws-auth_1.0.0-1.debian.tar.xz
 4e94a1fb3d2faf86e64a088aeb0e3cdc 6654 devel optional 
golang-github-smartystreets-go-aws-auth_1.0.0-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEULx8+TnSDCcqawZWUra72VOWjRsFAl4H3TIACgkQUra72VOW
jRsagw/+PMlIAY4CVEc1CFCTmLDTwbYKwIMzely4fXjj/jbnNNumlaPBNuI3bBnL
ZJTiqN14Pu4lJUTasJkwDX8YS3VTLZ7ELwuMEFBkx+0m7+k8LBTGkAdL4SaHGG0/
R7xYrLvId0KcSE3skoSuVJponvwjVGDJcal0OVO92ix4axiA7VVb0RlYmhV0wqOe
WB78AVUigx0YDIjuGXMV/s+AAi2dTyIL2LibCNqBtNiqosipoRIWRKIbIRtAbT4h
ev+1v8qK1KXn0e5fA88I0M3X3bJwAw0JJlNsSqWIb9rqopTzP9nUHspAAoe5VV8x
1/zQIJIxHRNuLJoiZOxv8C+9PIokCOY8U1IPglYQpUdXRnue9+GRpl8nSS8yk5rS
AWL66valcuxb5wIO/TK5DDC1LEIqeuht17CVQjw32eO2IU9ZxDDvUSG4nZXKZzzF
hlcp53MFdjxiIy6AyBwX40HJ358SIpXcXC9GuuIUB+oZQmW9prZdY/ZfeCfbzBJ+
KuMDeWrt/a00sTwzaRxs7dfX3jDy1kB7JHmPuthulKH1qWKZVo0Hjq7sJz6LyrLu
5S1rBt7lqh58m0ICIYrh0jw+BKORZBr2qp4oDO5yGCfTPhLH7ahnjvAIKd/zraBu
ruB6clTy8rdA5hGbDd6S3+vaOYOn0Jk1tX7msKZUTwPyZgovfNA=
=qPtG
-----END PGP SIGNATURE-----

--- End Message ---
_______________________________________________
Pkg-go-maintainers mailing list
Pkg-go-maintainers@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-go-maintainers

Reply via email to