Your message dated Mon, 20 Aug 2018 09:50:15 +0000
with message-id <e1frgpd-000fxn...@fasolo.debian.org>
and subject line Bug#906427: fixed in duplicity 0.7.17-2
has caused the Debian Bug report #906427,
regarding duplicity: FTBFS: test failure (gpg failed)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
906427: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906427
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: duplicity
Version: 0.7.17-1
Severity: serious
Tags: ftbfs
Justification: fails to build from source (but built successfully in the past)

Hi,

Building duplicity in a current sid/amd64 chroot fails with:

======================================================================
ERROR: test_sigchain_fileobj (testing.unit.test_collections.CollectionTest)
Test getting signature chain fileobjs from archive_dir
----------------------------------------------------------------------
Traceback (most recent call last):
  File "/<<PKGBUILDDIR>>/testing/unit/test_collections.py", line 188, in 
test_sigchain_fileobj
    self.sigchain_fileobj_check_list(self.sigchain_fileobj_get(None))
  File "/<<PKGBUILDDIR>>/testing/unit/test_collections.py", line 180, in 
sigchain_fileobj_check_list
    test_fileobj(0, "Hello, world!")
  File "/<<PKGBUILDDIR>>/testing/unit/test_collections.py", line 177, in 
test_fileobj
    fileobjlist[i].close()
  File "/<<PKGBUILDDIR>>/duplicity/dup_temp.py", line 227, in close
    assert not self.fileobj.close()
  File "/<<PKGBUILDDIR>>/duplicity/gpg.py", line 304, in close
    self.gpg_failed()
  File "/<<PKGBUILDDIR>>/duplicity/gpg.py", line 271, in gpg_failed
    raise GPGError(msg)
GPGError: GPG Failed, see log below:
===== Begin GnuPG log =====
gpg: CAST5 encrypted data
gpg: encrypted with 1 passphrase
gpg: WARNING: message was not integrity protected
gpg: Hint: If this message was created before the year 2003 it is
likely that this message is legitimate.  This is because back
then integrity protection was not widely used.
gpg: Use the option '--ignore-mdc-error' to decrypt anyway.
gpg: decryption forced to fail!
gpg: WARNING: unsafe permissions on homedir '/<<PKGBUILDDIR>>/testing/gnupg'
===== End GnuPG log =====


----------------------------------------------------------------------
Ran 418 tests in 987.770s

FAILED (errors=1, skipped=9)
Test failed: <unittest.runner.TextTestResult run=418 errors=1 failures=0>
error: Test failed: <unittest.runner.TextTestResult run=418 errors=1 failures=0>
make[1]: *** [debian/rules:11: override_dh_auto_test] Error 1
======================================================================

Same is observed by reproducible builds: 
https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/duplicity.html

Complete build log attached.


-- dam

Attachment: duplicity_amd64-2018-08-17T10:52:37Z.build.xz
Description: application/xz


--- End Message ---
--- Begin Message ---
Source: duplicity
Source-Version: 0.7.17-2

We believe that the bug you reported is fixed in the latest version of
duplicity, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 906...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alexander Zangerl <a...@debian.org> (supplier of updated duplicity package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 20 Aug 2018 18:55:44 +1000
Source: duplicity
Binary: duplicity
Architecture: source amd64
Version: 0.7.17-2
Distribution: unstable
Urgency: high
Maintainer: Alexander Zangerl <a...@debian.org>
Changed-By: Alexander Zangerl <a...@debian.org>
Description:
 duplicity  - encrypted bandwidth-efficient backup
Closes: 900807 906427
Changes:
 duplicity (0.7.17-2) unstable; urgency=high
 .
   * applied upstream patch to work around changed gnupg behaviour wrt.
     MDC (closes: #906427)
   * minor manpage amendment (closes: #900807)
Checksums-Sha1:
 18286b698303243df31838f14113a4e82c1efeac 1879 duplicity_0.7.17-2.dsc
 7fe47beff3b61e1713b26d40f912abd447256de2 18800 duplicity_0.7.17-2.debian.tar.xz
 8284a066c4cdb56b6a6a1bc2f268800c1f684b62 15004 
duplicity-dbgsym_0.7.17-2_amd64.deb
 42576089a98d630e221a0eac279bf377c2e20712 8758 
duplicity_0.7.17-2_amd64.buildinfo
 2b6f293ab656673fac621db7d5c69df309028530 344384 duplicity_0.7.17-2_amd64.deb
Checksums-Sha256:
 038cdb97f2f615f781059065ffc6d17894a92a82c5331f0815a79c06219d382c 1879 
duplicity_0.7.17-2.dsc
 040d44db5d49cfae56bc228eb082b13cb11ab928b4e21ee593ebc3ff86a7e3d5 18800 
duplicity_0.7.17-2.debian.tar.xz
 488f214862808b878a8881e98b4505a151776b199f15c4e53fd1a72f852b708c 15004 
duplicity-dbgsym_0.7.17-2_amd64.deb
 3f6556d5420507d58525fe4763138d74607c5a699ae5b87876549fcddd21f0d9 8758 
duplicity_0.7.17-2_amd64.buildinfo
 734bc7cff7aeaf0f541a1a8ed5bb255d0ecba7078c41cd1134d94cc821defc90 344384 
duplicity_0.7.17-2_amd64.deb
Files:
 70328e15cfa77df35d06e387fff97e6f 1879 utils optional duplicity_0.7.17-2.dsc
 f712a7d9b990b24150c25340cc771fe9 18800 utils optional 
duplicity_0.7.17-2.debian.tar.xz
 7178db57f668b848ab30fba4bc385113 15004 debug optional 
duplicity-dbgsym_0.7.17-2_amd64.deb
 f3f1bebf97d6d0811403a62cd465b952 8758 utils optional 
duplicity_0.7.17-2_amd64.buildinfo
 5d4404de5dbd668e36a8d692d35beab9 344384 utils optional 
duplicity_0.7.17-2_amd64.deb

-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJbeoivAAoJED06g4g30PqNzYwQALs9sNpG3goSn+DhOewMzPUa
XnopmpzeS9aLC+qb0FoYdXSXAyRLBZmoEyyGZWPMhGdbZRVqVwfSL5tYW4zU42go
Z/zE8O9Bah/4BhOR4uvIjPyZYwLz9pyS1KifCDfeGiFXZCYJXH1Bz/5xSIZyXWYe
JA4k5gCHWKKus0ZQbi8DViivP8atHhpEXxODUrOYlvWR+RE09ot25NkDiI+Vqd5B
zcmLyPxix0ujPWphL3TFuI+J7oyStTdWPhFLgwIrCiq4oiEtRby/x3A53ihAE9OY
Mt7psg6zYIe8ttAVMbYD7DNunkCoOBCnaclwqc6oR8BzAHZRFoz6BrWp4YCk27yj
c1Abdv1yJdqJtzzP12XuaPE+6hWwMm9sfoAb4F73DBLoOxl+VMCgz5Wm2oeevfKA
sWJovcyOfM9e1xuivDkFi1GaSkcVwzNMFJBx1PnkHg2wlkblSz1Xdzr+5prfiyv1
rfRhXxs/GR/pgxbBl4105d1XoC82te2VAkxsvKckmWtwhC9WSKZizWLowp2Enx9K
CxJ1ho+NpVCnaO/hKl9D9BHQOdBcKAygrE/+uyDTN06hfE0ACYZ/VyNblxw0of1w
+2CG6T7yF0nQq7bwDM+HhKCkDydvUb77oiRRiXFGJfS90Si2IU1y1A/pX8gLihUU
zZSb5fE98lmHUbJgEQ3+
=9wx8
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to