Source: m2crypto Version: 0.31.0-2 Severity: important X-Debbugs-CC: debian...@lists.debian.org, open...@packages.debian.org User: debian...@lists.debian.org Usertags: needs-update Control: affects -1 src:openssl
Dear maintainers, With a recent upload of openssl the autopkgtest of m2crypto fails in testing when that autopkgtest is run with the binary packages of openssl from unstable. It passes when run with only packages from testing. In tabular form: pass fail openssl from testing 1.1.1b-1 m2crypto from testing 0.31.0-2 all others from testing from testing I copied some of the output at the bottom of this report. Currently this regression is blocking the migration of openssl to testing [1]. Of course, openssl shouldn't just break your autopkgtest (or even worse, your package), but it seems to me that the change in openssl could very well be intended and your package needs to update to the new situation. If needed, please change the bug's severity and in doubt, please discuss with the maintainers of openssl (in X-Debbugs-CC). If this is a real problem in your package (and not only in your autopkgtest), the right binary package(s) from openssl should really add a versioned Breaks on the unfixed version of (one of your) package(s). Please note that the window to fix this to allow openssl to migrate without intervention is closing extremely soon. More information about this bug and the reason for filing it can be found on https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation Paul [1] https://qa.debian.org/excuses.php?package=openssl https://ci.debian.net/data/autopkgtest/testing/amd64/m/m2crypto/2021379/log.gz =================================== FAILURES =================================== _____________________ MiscSSLClientTestCase.test_cipher_ok _____________________ self = <tests.test_ssl.MiscSSLClientTestCase testMethod=test_cipher_ok> def test_cipher_ok(self): if OPENSSL111: TCIPHER = 'TLS_AES_256_GCM_SHA384' else: TCIPHER = 'AES128-SHA' self.args = self.args + ['-cipher', TCIPHER] pid = self.start_server(self.args) try: ctx = SSL.Context() s = SSL.Connection(ctx) s.set_cipher_list(TCIPHER) > s.connect(self.srv_addr) tests/test_ssl.py:472: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ /usr/lib/python2.7/dist-packages/M2Crypto/SSL/Connection.py:303: in connect self.socket.connect(addr) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ name = 'connect', self = <socket._socketobject object at 0x7f9a73eeeb40> args = (('localhost', 43581),) def meth(name,self,*args): > return getattr(self._sock,name)(*args) E error: [Errno 111] Connection refused /usr/lib/python2.7/socket.py:228: error
signature.asc
Description: OpenPGP digital signature