Your message dated Mon, 01 Jul 2024 12:05:41 +0000
with message-id <e1sofmv-003vle...@fasolo.debian.org>
and subject line Bug#1061458: fixed in gdm3 46.2-1
has caused the Debian Bug report #1061458,
regarding gdm3: Testsuite breaks with openssl 3.2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1061458: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061458
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:gdm3
Version: 45.0.1-2
Severity: important
Tags: sid patch
control: affects -1 src:openssl
User: pkg-openssl-de...@lists.alioth.debian.org
Usertags: openssl-3.2

The argument "-extensions v3_ca" for req is invalid and not considered.
Earlier versions of openssl silently ignored that argument, openssl 3.2
throws an error now, see
        https://ci.debian.net/packages/g/gdm3/unstable/amd64/
        https://ci.debian.net/packages/g/gdm3/unstable/amd64/41875309/

Sebastian
From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc>
Date: Wed, 24 Jan 2024 21:32:49 +0100
Subject: [PATCH] debian: Adapt tests for openssl3.2
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

The argument "-extensions v3_ca" for req is invalid and not considered.
Earlier versions of openssl silently ignored that argument, openssl 3.2
throws an error now:
|  openssl req -batch -new -nodes … -extensions v3_ca …
| Error adding request extensions from section v3_ca
| 0071DD54987F0000:error:11000079:X509 V3 routines:v2i_AUTHORITY_KEYID:no issuer certificate:../crypto/x509/v3_akid.c:156:
| 0071DD54987F0000:error:11000080:X509 V3 routines:X509V3_EXT_nconf_int:error in extension:../crypto/x509/v3_conf.c:48:section=v3_ca, name=authorityKeyIdentifier, value=keyid:always,issuer:always

Remove the not relevant argument "-extensions v3_ca".

Signed-off-by: Sebastian Andrzej Siewior <sebast...@breakpoint.cc>
---
 debian/tests/sssd-softhism2-certificates-tests.sh | 2 --
 1 file changed, 2 deletions(-)

diff --git a/debian/tests/sssd-softhism2-certificates-tests.sh b/debian/tests/sssd-softhism2-certificates-tests.sh
index 00c533f127dd..a68812673983 100644
--- a/debian/tests/sssd-softhism2-certificates-tests.sh
+++ b/debian/tests/sssd-softhism2-certificates-tests.sh
@@ -217,7 +217,6 @@ openssl req \
   -key "$tmpdir/test-intermediate-CA-key.pem" \
   -passout "$root_ca_key_pass" \
   -sha256 \
-  -extensions v3_ca \
   -out "$tmpdir/test-intermediate-CA-certificate-request.pem"
 
 openssl req -text -noout -in "$tmpdir/test-intermediate-CA-certificate-request.pem"
@@ -306,7 +305,6 @@ openssl req \
   -key "$tmpdir/test-sub-intermediate-CA-key.pem" \
   -passout "$intermediate_ca_key_pass" \
   -sha256 \
-  -extensions v3_ca \
   -out "$tmpdir/test-sub-intermediate-CA-certificate-request.pem"
 
 openssl req -text -noout -in "$tmpdir/test-sub-intermediate-CA-certificate-request.pem"
-- 
2.43.0


--- End Message ---
--- Begin Message ---
Source: gdm3
Source-Version: 46.2-1
Done: Jeremy Bícha <jbi...@ubuntu.com>

We believe that the bug you reported is fixed in the latest version of
gdm3, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1061...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jeremy Bícha <jbi...@ubuntu.com> (supplier of updated gdm3 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 01 Jul 2024 07:45:23 -0400
Source: gdm3
Built-For-Profiles: noudeb
Architecture: source
Version: 46.2-1
Distribution: unstable
Urgency: medium
Maintainer: Debian GNOME Maintainers 
<pkg-gnome-maintain...@lists.alioth.debian.org>
Changed-By: Jeremy Bícha <jbi...@ubuntu.com>
Closes: 1061458
Changes:
 gdm3 (46.2-1) unstable; urgency=medium
 .
   [ Jeremy Bícha ]
   * New upstream release
   * Drop 2 patches applied in new release
 .
   [ Sebastian Andrzej Siewior ]
   * Adapt autopkgtest for openssl3.2 (Closes: #1061458)
Checksums-Sha1:
 1e529e92d7ea42caecc382fce58005064e92d469 3142 gdm3_46.2-1.dsc
 eae3c1c9afc1acfec12f644a6f12ac4938a696ec 931868 gdm3_46.2.orig.tar.xz
 6c32469ba2edd07e52b50742c8562ec4d397b6d6 85196 gdm3_46.2-1.debian.tar.xz
 c0300f023f8e74c007e0b24149c74a341b0f23aa 18474 gdm3_46.2-1_source.buildinfo
Checksums-Sha256:
 beb05f8586c1bf8c6997bd20c3e7aaf6a57d5543abe7bb3429f8af957dfe338c 3142 
gdm3_46.2-1.dsc
 4ee345422a16537150cd842450cda52b2ca86984bc51ee20cdc025dcf4bd268b 931868 
gdm3_46.2.orig.tar.xz
 7086d632801d0b56011d47d9fa393f61fdf994bfb6c3121ce37e1ad390af57c8 85196 
gdm3_46.2-1.debian.tar.xz
 f5b5be252708858deea5743e1fc43604c9c846ed208b8f65b3912ed0b99207f3 18474 
gdm3_46.2-1_source.buildinfo
Files:
 060da07c16de42f2ce1ffb5cc09a434d 3142 gnome optional gdm3_46.2-1.dsc
 1d92ec4dd0643907fa135056aee18066 931868 gnome optional gdm3_46.2.orig.tar.xz
 3fd05954644071d558f4359006c3fd83 85196 gnome optional gdm3_46.2-1.debian.tar.xz
 c9cfd3c228fa293f422c1588b70adcdd 18474 gnome optional 
gdm3_46.2-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=6FVw
-----END PGP SIGNATURE-----

Attachment: pgpmB0_nBzqKq.pgp
Description: PGP signature


--- End Message ---

Reply via email to