Your message dated Sat, 10 Nov 2018 11:20:17 +0000
with message-id <e1glrjj-000d5t...@fasolo.debian.org>
and subject line Bug#907219: fixed in m2crypto 0.31.0-1
has caused the Debian Bug report #907219,
regarding m2crypto: autopkgtest needs update for new version of openssl
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
907219: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907219
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: m2crypto
Version: 0.27.0-6
X-Debbugs-CC: debian...@lists.debian.org
User: debian...@lists.debian.org
Usertags: needs-update
Control: affects -1 src:openssl
Control: block 907015 by -1

Dear maintainers,

With a recent upload of openssl the autopkgtest of m2crypto started to
fail in testing. I copied some of the output below.

Of course, openssl shouldn't just break your autopkgtest (or even worse,
your package), but the change in openssl was intended and your package
needs to update to the new situation. If needed, please change the bug's
severity.

If this is a real problem in your package (and not only in your
autopkgtest), the right binary package(s) from openssl should really add
a versioned Breaks on the unfixed version of (one of your) package(s),
hence I added a blocking relation on the openssl bug that tracks that.
Note: the Breaks is nice even if the issue is only in the autopkgtest as
it helps the migration software to figure out the right versions to
combine in the tests.

A quote from the openssl maintainer about the openssl update:
"
This is probably the result of the default openssl.cfg now having:
[system_default_sect]
MinProtocol = TLSv1.2
CipherString = DEFAULT@SECLEVEL=2

Where the SECLEVEL 2 requires a 112 / 2048 bit security level.
"

More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=openssl

https://ci.debian.net/data/autopkgtest/testing/amd64/m/m2crypto/874888/log.gz

/usr/lib/python2.7/dist-packages/M2Crypto/httpslib.py:88: error
_____________ TwistedSSLClientTestCase.test_makefile_timeout_fires
_____________

self = <tests.test_ssl.TwistedSSLClientTestCase
testMethod=test_makefile_timeout_fires>

    def test_makefile_timeout_fires(self):
        # This is convoluted because (openssl s_server -www) starts
        # writing the response as soon as it receives the first line of
        # the request, so it's possible for it to send the response
        # before the request is sent and there would be no timeout.  So,
        # let the server spend time reading from an empty pipe
        FIFO_NAME = 'test_makefile_timeout_fires_fifo'  # noqa
        os.mkfifo('tests/' + FIFO_NAME)
        pipe_pid = os.fork()
        try:
            if pipe_pid == 0:
                try:
                    with open('tests/' + FIFO_NAME, 'w') as f:
                        time.sleep(sleepTime + 1)
                        f.write('Content\n')
                finally:
                    os._exit(0)
            self.args[self.args.index('-www')] = '-WWW'
            pid = self.start_server(self.args)
            try:
                c = httpslib.HTTPSConnection(srv_host, self.srv_port)
                c.putrequest('GET', '/' + FIFO_NAME)
                c.putheader('Accept', 'text/html')
                c.putheader('Accept', 'text/plain')
>               c.endheaders()

tests/test_ssl.py:988:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_ _ _ _
/usr/lib/python2.7/httplib.py:1038: in endheaders
    self._send_output(message_body)
/usr/lib/python2.7/httplib.py:882: in _send_output
    self.send(msg)
/usr/lib/python2.7/httplib.py:844: in send
    self.connect()
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_ _ _ _

self = <M2Crypto.httpslib.HTTPSConnection instance at 0x7f6b85bfde60>

    def connect(self):
        # type: () -> None
        error = None
        # We ignore the returned sockaddr because SSL.Connection.connect
needs
        # a host name.
        for (family, _, _, _, _) in \
                socket.getaddrinfo(self.host, self.port, 0,
                                   socket.SOCK_STREAM):
            sock = None
            try:
                sock = SSL.Connection(self.ssl_ctx, family=family)

                # set SNI server name since we know it at this point
                sock.set_tlsext_host_name(self.host)

                if self.session is not None:
                    sock.set_session(self.session)
                sock.connect((self.host, self.port))

                self.sock = sock
                sock = None
                return
            except socket.error as e:
                # Other exception are probably SSL-related, in that case we
                # abort and the exception is forwarded to the caller.
                error = e
            finally:
                if sock is not None:
                    sock.close()

        if error is None:
            raise AssertionError("Empty list returned by getaddrinfo")
>       raise error
E       error: [Errno 111] Connection refused

/usr/lib/python2.7/dist-packages/M2Crypto/httpslib.py:88: error
____________________ TwistedSSLClientTestCase.test_timeout
_____________________

self = <tests.test_ssl.TwistedSSLClientTestCase testMethod=test_timeout>

    def test_timeout(self):
        pid = self.start_server(self.args)
        try:
            ctx = SSL.Context()
            s = SSL.Connection(ctx)
            # Just a really small number so we can timeout
            s.settimeout(0.000000000000000000000000000001)
            with self.assertRaises(SSL.SSLTimeoutError):
>               s.connect(self.srv_addr)

tests/test_ssl.py:941:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_ _ _ _
/usr/lib/python2.7/dist-packages/M2Crypto/SSL/Connection.py:298: in connect
    self.socket.connect(addr)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_ _ _ _

name = 'connect', self = <socket._socketobject object at 0x7f6b85725ec0>
args = (('localhost', 39635),)

    def meth(name,self,*args):
>       return getattr(self._sock,name)(*args)
E       error: [Errno 111] Connection refused

/usr/lib/python2.7/socket.py:228: error
________________________ ContextTestCase.test_certstore
________________________

self = <tests.test_ssl_offline.ContextTestCase testMethod=test_certstore>

    def test_certstore(self):
        ctx = SSL.Context()
        ctx.set_verify(SSL.verify_peer | SSL.verify_fail_if_no_peer_cert, 9)
        ctx.load_verify_locations('tests/ca.pem')
>       ctx.load_cert('tests/x509.pem')

tests/test_ssl_offline.py:58:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_ _ _ _

self = <M2Crypto.SSL.Context.Context instance at 0x7f6b859ada28>
certfile = 'tests/x509.pem', keyfile = None
callback = <function passphrase_callback at 0x7f6b85efdf50>

    def load_cert(self, certfile, keyfile=None,
                  callback=util.passphrase_callback):
        # type: (AnyStr, Optional[AnyStr], Callable) -> None
        """Load certificate and private key into the context.

            :param certfile: File that contains the PEM-encoded certificate.
            :param keyfile:  File that contains the PEM-encoded private key.
                             Default value of None indicates that the
private key
                             is to be found in 'certfile'.
            :param callback: Callable object to be invoked if the
private key is
                             passphrase-protected. Default callback
provides a
                             simple terminal-style input for the passphrase.
            """
        m2.ssl_ctx_passphrase_callback(self.ctx, callback)
>       m2.ssl_ctx_use_cert(self.ctx, certfile)
E       SSLError: ee key too small

Attachment: signature.asc
Description: OpenPGP digital signature


--- End Message ---
--- Begin Message ---
Source: m2crypto
Source-Version: 0.31.0-1

We believe that the bug you reported is fixed in the latest version of
m2crypto, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 907...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Daniel Stender <sten...@debian.org> (supplier of updated m2crypto package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 10 Nov 2018 11:49:42 +0100
Source: m2crypto
Binary: python-m2crypto m2crypto-doc
Architecture: source all amd64
Version: 0.31.0-1
Distribution: unstable
Urgency: medium
Maintainer: Daniel Stender <sten...@debian.org>
Changed-By: Daniel Stender <sten...@debian.org>
Description:
 m2crypto-doc - Python wrapper for the OpenSSL library (docs)
 python-m2crypto - Python wrapper for the OpenSSL library (Python 2 modules)
Closes: 907219
Changes:
 m2crypto (0.31.0-1) unstable; urgency=medium
 .
   * Upload to unstable.
   * New upstream release (Closes: #907219).
   * deb/clean:
     + clean .pytest_cache instead of .cache.
   * deb/control:
     + bump standards version to 4.2.1 (no further changes needed).
   * deb/copyright:
     + add M2Crypto.egg-info to Files-Excluded.
   * deb/rules:
     + build with DH_VERBOSE=1 (according to standards 4.2.0).
     + build with hardening=+all.
     + drop unnecessary export line for DEB_BUILD_OPTIONS.
     + un-failsafe tests.
   * install switches for build profiles:
     + d/control: add !nodoc and !nocheck switches to b-deps, Build-
       Profiles to docs package.
     + d/rules: add if-loop to not run sphinxdoc dh ext if nodoc profile
       is set.
   * build with dh 11 (changes in d/control and d/compat).
Checksums-Sha1:
 505787bd7b4dcb848ed1d24c1d15ae6d05deab99 2290 m2crypto_0.31.0-1.dsc
 0ada6dd60c66c3ec8d7497c2ffa6fb1ad08f46a7 892799 m2crypto_0.31.0.orig.tar.gz
 8e87a5d8aceb49aea4df0f283533b0d6eed163d3 57216 m2crypto_0.31.0-1.debian.tar.xz
 68a114de5218ffee48e90f0d198c0a596bbd8557 191688 m2crypto-doc_0.31.0-1_all.deb
 c6bd4ef0a0806ce8c57f74502bc8fd30e43bcbab 8583 m2crypto_0.31.0-1_amd64.buildinfo
 f9b9208aa6d267bc6b96a4ab842308833bf416c6 429152 
python-m2crypto-dbgsym_0.31.0-1_amd64.deb
 a12bbeee080b606b65b9f8d0ff4b4f97db82707e 181800 
python-m2crypto_0.31.0-1_amd64.deb
Checksums-Sha256:
 3daa753e2de90c6146703839f2a63967ebd09f7e0cd68f5a5e3cba3e4a089440 2290 
m2crypto_0.31.0-1.dsc
 5d14d4b59c270d2e43ad3e24e855deb3e9f52544be83d9df1ff9417c06c13985 892799 
m2crypto_0.31.0.orig.tar.gz
 7aae7d7ad4108264c9e86355d831959ddfa7b279038508e1f74ee6a17667e47a 57216 
m2crypto_0.31.0-1.debian.tar.xz
 d1e53f2438e76bde6dda8548bc133e21ba298cc2fe5c3f8e7e7a9883bc2ec25b 191688 
m2crypto-doc_0.31.0-1_all.deb
 909c5018a6afd217a2e44b87dc89a30bcb3fc0176c47b7bbacfb95c070e04618 8583 
m2crypto_0.31.0-1_amd64.buildinfo
 2fb61aeebcf755c4a4b82a1ec9b35cfd8e714271bb0f03609531fe4e329e8f35 429152 
python-m2crypto-dbgsym_0.31.0-1_amd64.deb
 53aa394fca9e9c4ca95684317342ea82e506091ef607b58316384c606b70c29c 181800 
python-m2crypto_0.31.0-1_amd64.deb
Files:
 e0da5a87eedcd3406396b76c836afaa4 2290 python optional m2crypto_0.31.0-1.dsc
 bcf42b36e2eccf5d0254ed7c94d5fb31 892799 python optional 
m2crypto_0.31.0.orig.tar.gz
 093263133994f424782eadf9dedfb239 57216 python optional 
m2crypto_0.31.0-1.debian.tar.xz
 601d61c89a1aa54bd969f57f4f7709a1 191688 doc optional 
m2crypto-doc_0.31.0-1_all.deb
 fd58f6d94dc428e0207fda1882a5558b 8583 python optional 
m2crypto_0.31.0-1_amd64.buildinfo
 eb8c3926e378829639a0ee0d1e9e45f1 429152 debug optional 
python-m2crypto-dbgsym_0.31.0-1_amd64.deb
 031c72ac074993670bb252f96a9fac89 181800 python optional 
python-m2crypto_0.31.0-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
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=vbnY
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to