Your message dated Tue, 27 Dec 2016 13:48:36 +0000 with message-id <[email protected]> and subject line Bug#711628: fixed in libhttp-daemon-ssl-perl 1.04-3.1 has caused the Debian Bug report #711628, regarding libhttp-daemon-ssl-perl: FTBFS: test failure to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 711628: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711628 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Source: libhttp-daemon-ssl-perl Version: 1.04-3 Severity: serious Justification: FTBFS This package FTBFS (in a clean sid sbuild session): Can't call method "get_request" on an undefined value at t/testmodule.t line 90. t/testmodule.t .. Dubious, test returned 255 (wstat 65280, 0xff00) Failed 1/2 test programs. 2/10 subtests failed. Failed 4/9 subtests Test Summary Report ------------------- t/testmodule.t (Wstat: 65280 Tests: 7 Failed: 2) Failed tests: 4, 6 Non-zero exit status: 255 Parse errors: Tests out of sequence. Found (4) but expected (7) Bad plan. You planned 9 tests but ran 7. Files=2, Tests=10, 1 wallclock secs ( 0.03 usr 0.01 sys + 0.14 cusr 0.02 csys = 0.20 CPU) Result: FAIL -- Dominic Hargreaves | http://www.larted.org.uk/~dom/ PGP key 5178E2A5 from the.earth.li (keyserver,web,email)
--- End Message ---
--- Begin Message ---Source: libhttp-daemon-ssl-perl Source-Version: 1.04-3.1 We believe that the bug you reported is fixed in the latest version of libhttp-daemon-ssl-perl, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Mike Gabriel <[email protected]> (supplier of updated libhttp-daemon-ssl-perl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Tue, 27 Dec 2016 13:34:04 +0100 Source: libhttp-daemon-ssl-perl Binary: libhttp-daemon-ssl-perl Architecture: source Version: 1.04-3.1 Distribution: unstable Urgency: medium Maintainer: Matej Vela <[email protected]> Changed-By: Mike Gabriel <[email protected]> Description: libhttp-daemon-ssl-perl - A simple HTTP server class with SSL support Closes: 711628 Changes: libhttp-daemon-ssl-perl (1.04-3.1) unstable; urgency=medium . * Non-maintainer upload. * debian/{control,compat}: Bump to DH version level 9. * debian/patches: Add testmodule.diff. Fix FTBFS during unit testing due to incompatibility with latest SSL libs. (Closes: #711628). This patch amongst other things regenerate the test certificates at build time. * debian/rules: Save upstream's certificate files, so that the package build stays idempotent. Checksums-Sha1: a67fcda8952b8b4b31e52bd4a68bcad946065227 1915 libhttp-daemon-ssl-perl_1.04-3.1.dsc a50acc3d54e8c81fe66e3ca4ec170fccc86f4ac2 3496 libhttp-daemon-ssl-perl_1.04-3.1.debian.tar.xz Checksums-Sha256: 21a44be04809607adcdaa3232413bd58389bbe48b2f64634b505829698a3378d 1915 libhttp-daemon-ssl-perl_1.04-3.1.dsc a62904adcb7769f41f6a13da2725fba27fdb29db4ed655a498f6ed7b4abaf17f 3496 libhttp-daemon-ssl-perl_1.04-3.1.debian.tar.xz Files: ef31a6ba494d13f2d517bf6540f8b0f7 1915 perl extra libhttp-daemon-ssl-perl_1.04-3.1.dsc a9eaaf6c72472fe7483cf14f1c81ce90 3496 perl extra libhttp-daemon-ssl-perl_1.04-3.1.debian.tar.xz -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJYYmvCAAoJEJr0azAldxsxQBAP/R5HhuDGmnrSsLukq9ugdaC5 hG0vrWovduzfaA4VDyHvvToUATSywHO1f/sQiLqGowelOxD+OnddJwZjPNENVJGS q8j/9E3iHZJtX42fLCTPSIt6cOXtbmQSmj+23dxa9RGJgqKSFydpeCdx6j1r7ikI IFrLwA1m3yHzuZiGwhYuh0LbVPL3sPY5GlWiIwmocvbUo5VSR4bWsG7O1SjNCHmW Jm2o+PQBdZUZJco8nF+tKgZS9YmtBz+QAA2ugNaOTtGcrQhJTWh8ccAlGwEzSpdG 9p5cp1IhqvNoR14WIjnYnJT04lK0sZOALKxwCkkHH3oVTH+3aYXAc5vTgE2J4fs3 VZKzSnU8vRv5ra9Wlox6dJp+0gVs7htdcWPHGWeOBw1XsFelv0P10DoT5vFcPPWW +w42VtG8ie1VTBThwWBobIXzMnXIn5x1jxiFDyoH0i0Flde41IwNTeT6CkvZzi7o vPkoOVQgLXWwRCIFz8su7AGviMyP305c7ah26ADbMvMHsgudIdBDfyuMWeRiVHgM AY/TE4dldU6pqs6pKPssLlAW/BiF1nGryCGZu/w3BnmmA16GcvEnLpBR787HBKkF DSyHrHUUXc/N+4T7V0gpqraosd0vRKkQ0VIvJk1HFm9ot3/7sU/jfVY2PbZq7/XM 97TNqDKRE73aaoqe6yos =zUDJ -----END PGP SIGNATURE-----
--- End Message ---

