Your message dated Fri, 28 Jan 2022 14:39:37 +0000
with message-id <e1ndspz-0000is...@fasolo.debian.org>
and subject line Bug#974836: fixed in openconnect 8.10-7
has caused the Debian Bug report #974836,
regarding openconnect FTBFS on IPV6-only buildds
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
974836: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974836
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: openconnect
Version: 8.10-1
Severity: serious
Tags: ftbfs

https://buildd.debian.org/status/fetch.php?pkg=openconnect&arch=i386&ver=8.10-1~bpo10%2B1&stamp=1589917131&raw=0
https://buildd.debian.org/status/fetch.php?pkg=openconnect&arch=amd64&ver=8.10-1~bpo10%2B1&stamp=1589912458&raw=0
https://buildd.debian.org/status/fetch.php?pkg=openconnect&arch=amd64&ver=8.10-2&stamp=1603997003&raw=0

...
FAIL: auth-username-pass
========================

Testing certificate auth... 
warning: skipping unknown option 'cookie-validity'
Parsing plain auth method subconfig using legacy format
note: vhost:default: setting 'plain' as primary authentication method
note: setting 'file' as supplemental config option
listening (TCP) on [::]:443...
listening (UDP) on [::]:443...
ocserv[19194]: main: Starting 1 instances of ocserv-sm
ocserv[19194]: main: not using control unix socket
ocserv[19194]: main: initialized ocserv 1.1.1
ocserv[19214]: sec-mod: reading supplemental config from files
ocserv[19214]: sec-mod: sec-mod initialized (socket: ./ocserv-socket.af571984.0)
Connecting to obtain cookie... Failure: Could not receive cookie from server
ocserv[19194]: main: termination request received; waiting for children to die
FAIL auth-username-pass (exit status: 1)

FAIL: auth-certificate
======================

Testing certificate auth... 
warning: skipping unknown option 'cookie-validity'
Parsing plain auth method subconfig using legacy format
note: vhost:default: setting 'certificate+plain' as primary authentication 
method
note: setting 'file' as supplemental config option
listening (TCP) on [::]:443...
listening (UDP) on [::]:443...
ocserv[19199]: main: Starting 1 instances of ocserv-sm
ocserv[19199]: main: not using control unix socket
ocserv[19199]: main: initialized ocserv 1.1.1
ocserv[19215]: sec-mod: reading supplemental config from files
ocserv[19215]: sec-mod: sec-mod initialized (socket: ./ocserv-socket.bee4d321.0)
Connecting to obtain cookie (with key user-key-pkcs1.pem)... Failed to connect 
to host 127.0.0.2
Failed to open HTTPS connection to 127.0.0.2
Failed to obtain WebVPN cookie
Failure: Could not connect with key user-key-pkcs1.pem!
ocserv[19199]: main: termination request received; waiting for children to die
FAIL auth-certificate (exit status: 1)

FAIL: auth-nonascii
===================

Testing certificate auth with non-ASCII passwords... 
warning: skipping unknown option 'cookie-validity'
Parsing plain auth method subconfig using legacy format
note: vhost:default: setting 'certificate+plain' as primary authentication 
method
note: setting 'file' as supplemental config option
listening (TCP) on [::]:443...
listening (UDP) on [::]:443...
ocserv[19205]: main: Starting 1 instances of ocserv-sm
ocserv[19205]: main: not using control unix socket
ocserv[19205]: main: initialized ocserv 1.1.1
ocserv[19216]: sec-mod: reading supplemental config from files
ocserv[19216]: sec-mod: sec-mod initialized (socket: ./ocserv-socket.767477a3.0)
+ echo -n Connecting to obtain cookie (with password charset UTF-8)... 
Connecting to obtain cookie (with password charset UTF-8)... + cat ./pass-UTF-8
+ CERTARGS=-c ./certs/user-key-nonascii-password.p12 --key-password ĂŻ
+ echo test
+ LC_ALL=cs_CZ.UTF-8 LD_PRELOAD=libsocket_wrapper.so ../openconnect -q 
127.0.0.2:443 -u test -c ./certs/user-key-nonascii-password.p12 --key-password 
ĂŻ --servercert=d66b507ae074d03b02eafca40d35f87dd81049d3 --cookieonly 
--passwd-on-stdin
Failed to connect to host 127.0.0.2
Failed to open HTTPS connection to 127.0.0.2
Failed to obtain WebVPN cookie
+ fail 19205 Could not connect with charset UTF-8!
+ PID=19205
+ shift
+ echo Failure: Could not connect with charset UTF-8!
Failure: Could not connect with charset UTF-8!
+ kill 19205
+ test -n ./sockwrap.19193.tmp
+ rm -rf ./sockwrap.19193.tmp
+ exit 1
ocserv[19205]: main: termination request received; waiting for children to die
FAIL auth-nonascii (exit status: 1)

FAIL: cert-fingerprint
======================

Testing certificate auth... 
warning: skipping unknown option 'cookie-validity'
Parsing plain auth method subconfig using legacy format
note: vhost:default: setting 'plain' as primary authentication method
note: setting 'file' as supplemental config option
listening (TCP) on [::]:443...
listening (UDP) on [::]:443...
ocserv[19322]: main: Starting 1 instances of ocserv-sm
ocserv[19322]: main: not using control unix socket
ocserv[19322]: main: initialized ocserv 1.1.1
ocserv[19324]: sec-mod: reading supplemental config from files
ocserv[19324]: sec-mod: sec-mod initialized (socket: ./ocserv-socket.ece18a4f.0)
Testing with cert fingerprint 
d66b507ae074d03b02eafca40d35f87dd81049d3...Failure: Rejected good fingerprint 
d66b507ae074d03b02eafca40d35f87dd81049d3
ocserv[19322]: main: termination request received; waiting for children to die
FAIL cert-fingerprint (exit status: 1)

FAIL: id-test
=============

Testing certificate auth... 
Connecting with legacy hash... Failure: Could not receive cookie from server
FAIL id-test (exit status: 1)

FAIL: auth-pkcs11
=================

Testing PKCS#11 auth... 
warning: skipping unknown option 'cookie-validity'
Parsing plain auth method subconfig using legacy format
note: vhost:default: setting 'certificate+plain' as primary authentication 
method
note: setting 'file' as supplemental config option
listening (TCP) on [::]:443...
listening (UDP) on [::]:443...
ocserv[19397]: main: Starting 1 instances of ocserv-sm
ocserv[19397]: main: not using control unix socket
ocserv[19397]: main: initialized ocserv 1.1.1
ocserv[19401]: sec-mod: reading supplemental config from files
ocserv[19401]: sec-mod: sec-mod initialized (socket: ./ocserv-socket.2afed8e6.0)
Connecting to obtain cookie (token openconnect-test key object=RSA)... Failed 
to connect to host 127.0.0.2
Failed to open HTTPS connection to 127.0.0.2
Failed to obtain WebVPN cookie
Failure: Could not connect with token openconnect-test key object=RSA!
ocserv[19397]: main: termination request received; waiting for children to die
FAIL auth-pkcs11 (exit status: 1)

============================================================================
Testsuite summary for openconnect 8.10
============================================================================
# TOTAL: 9
# PASS:  3
# SKIP:  0
# XFAIL: 0
# FAIL:  6
# XPASS: 0
# ERROR: 0
============================================================================
See tests/test-suite.log
============================================================================
make[4]: *** [Makefile:898: test-suite.log] Error 1

--- End Message ---
--- Begin Message ---
Source: openconnect
Source-Version: 8.10-7
Done: Luca Boccassi <bl...@debian.org>

We believe that the bug you reported is fixed in the latest version of
openconnect, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 974...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luca Boccassi <bl...@debian.org> (supplier of updated openconnect package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 28 Jan 2022 13:57:59 +0000
Source: openconnect
Architecture: source
Version: 8.10-7
Distribution: unstable
Urgency: medium
Maintainer: Mike Miller <mtmil...@debian.org>
Changed-By: Luca Boccassi <bl...@debian.org>
Closes: 847980 974836
Changes:
 openconnect (8.10-7) unstable; urgency=medium
 .
   * Disable build-time tests (Closes: #974836)
   * Build-depend on libpskc-dev (Closes: #847980)
Checksums-Sha1:
 9252875ae49708c86560b6ec9074708c90ccd4ae 2937 openconnect_8.10-7.dsc
 e713617236bf4b824662a754fd43eea576fd6612 23496 openconnect_8.10-7.debian.tar.xz
 97cfa9a927d8ab1a2b9eac47203f9f877588c3b9 10156 
openconnect_8.10-7_source.buildinfo
Checksums-Sha256:
 dc23999dd0522c8f6da24bc3711d8235f670f8cee181fda84f4fcc3af80ce2bd 2937 
openconnect_8.10-7.dsc
 787a08c3955a86b840791d1d4ac9a870a7ece41cb137914df47b5ad728dd6733 23496 
openconnect_8.10-7.debian.tar.xz
 52192535df3f6ffd743358dee8395fed643b9666b3c08d8f2e05ba6867f47949 10156 
openconnect_8.10-7_source.buildinfo
Files:
 a811b4186ea5be5856b9cdbdba173179 2937 net optional openconnect_8.10-7.dsc
 de10e2cbebc875a5592ef11e55146567 23496 net optional 
openconnect_8.10-7.debian.tar.xz
 03d7c0ee4e114864e5208594e42efc01 10156 net optional 
openconnect_8.10-7_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQJFBAEBCgAvFiEErCSqx93EIPGOymuRKGv37813JB4FAmHz/DQRHGJsdWNhQGRl
Ymlhbi5vcmcACgkQKGv37813JB4nKg//Rc+egABQ2JyykKiFVl7CxJEV+GYXAiVo
acUFN5M9hHP7BHts75nifEKJZSlpwRCN/2tu5FBLjzJD/ssSOg5EQlfE+IOpvaaO
tqoIPflWLud9KnE1tZ09JsUp3dJ43aFIJv3d8QeuCz5So8qLtsBuEw0DIVBAUHpx
F2OY6vcnwZVwx+nBT6upWNJzyWDk4a6Ik/4x9gt97OEoLOan76+AyGCchSgd5hB+
8ayKIJMfWmnzpYr4cUDatKs+uUsxJPXoQXkqhQUtl3XuMvKF/o1dLkh7yD8vMkAP
KzDL3uNZmmHKaqgq0yZ/SJifKr7kGdzGsIMjvhtBHfq5iAOB21pCmwklEg6t6SVj
iYdxd5R4PQl4NRtktkVB1sIAkrF+EjRGW5o2ZLdGdvJQrdkrwfGkliHskg0xTyw2
Nti47uryEjLDMgNSsFIvP4WrGVFh1aNIfSzgsfjsfBzFTV4zKu84sT11bFhluJMb
p0JJSrre2o1mK+MrqnjcYpvoUObiNPFeIsVEzdji8ap87d0qoNYnuPgOwAO8n/ed
W8oGbgvTupUSA7TgCDflbDiiSMjr/nqenmN7sxrqcCWdJ8QT0ERFX7GJ8TTuTcQD
HEeJDel9OdAoZIrqmMfrxXxDae/e26rLXNoLIv1o1DA49zUcESfgHkECi28gXNRQ
x64cbrwSrYI=
=guvr
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to