Your message dated Mon, 20 Aug 2018 09:50:15 +0000 with message-id <e1frgpd-000fxn...@fasolo.debian.org> and subject line Bug#906427: fixed in duplicity 0.7.17-2 has caused the Debian Bug report #906427, regarding duplicity: FTBFS: test failure (gpg failed) to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 906427: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906427 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: duplicity Version: 0.7.17-1 Severity: serious Tags: ftbfs Justification: fails to build from source (but built successfully in the past) Hi, Building duplicity in a current sid/amd64 chroot fails with: ====================================================================== ERROR: test_sigchain_fileobj (testing.unit.test_collections.CollectionTest) Test getting signature chain fileobjs from archive_dir ---------------------------------------------------------------------- Traceback (most recent call last): File "/<<PKGBUILDDIR>>/testing/unit/test_collections.py", line 188, in test_sigchain_fileobj self.sigchain_fileobj_check_list(self.sigchain_fileobj_get(None)) File "/<<PKGBUILDDIR>>/testing/unit/test_collections.py", line 180, in sigchain_fileobj_check_list test_fileobj(0, "Hello, world!") File "/<<PKGBUILDDIR>>/testing/unit/test_collections.py", line 177, in test_fileobj fileobjlist[i].close() File "/<<PKGBUILDDIR>>/duplicity/dup_temp.py", line 227, in close assert not self.fileobj.close() File "/<<PKGBUILDDIR>>/duplicity/gpg.py", line 304, in close self.gpg_failed() File "/<<PKGBUILDDIR>>/duplicity/gpg.py", line 271, in gpg_failed raise GPGError(msg) GPGError: GPG Failed, see log below: ===== Begin GnuPG log ===== gpg: CAST5 encrypted data gpg: encrypted with 1 passphrase gpg: WARNING: message was not integrity protected gpg: Hint: If this message was created before the year 2003 it is likely that this message is legitimate. This is because back then integrity protection was not widely used. gpg: Use the option '--ignore-mdc-error' to decrypt anyway. gpg: decryption forced to fail! gpg: WARNING: unsafe permissions on homedir '/<<PKGBUILDDIR>>/testing/gnupg' ===== End GnuPG log ===== ---------------------------------------------------------------------- Ran 418 tests in 987.770s FAILED (errors=1, skipped=9) Test failed: <unittest.runner.TextTestResult run=418 errors=1 failures=0> error: Test failed: <unittest.runner.TextTestResult run=418 errors=1 failures=0> make[1]: *** [debian/rules:11: override_dh_auto_test] Error 1 ====================================================================== Same is observed by reproducible builds: https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/duplicity.html Complete build log attached. -- dam
duplicity_amd64-2018-08-17T10:52:37Z.build.xz
Description: application/xz
--- End Message ---
--- Begin Message ---Source: duplicity Source-Version: 0.7.17-2 We believe that the bug you reported is fixed in the latest version of duplicity, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 906...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Alexander Zangerl <a...@debian.org> (supplier of updated duplicity package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Mon, 20 Aug 2018 18:55:44 +1000 Source: duplicity Binary: duplicity Architecture: source amd64 Version: 0.7.17-2 Distribution: unstable Urgency: high Maintainer: Alexander Zangerl <a...@debian.org> Changed-By: Alexander Zangerl <a...@debian.org> Description: duplicity - encrypted bandwidth-efficient backup Closes: 900807 906427 Changes: duplicity (0.7.17-2) unstable; urgency=high . * applied upstream patch to work around changed gnupg behaviour wrt. MDC (closes: #906427) * minor manpage amendment (closes: #900807) Checksums-Sha1: 18286b698303243df31838f14113a4e82c1efeac 1879 duplicity_0.7.17-2.dsc 7fe47beff3b61e1713b26d40f912abd447256de2 18800 duplicity_0.7.17-2.debian.tar.xz 8284a066c4cdb56b6a6a1bc2f268800c1f684b62 15004 duplicity-dbgsym_0.7.17-2_amd64.deb 42576089a98d630e221a0eac279bf377c2e20712 8758 duplicity_0.7.17-2_amd64.buildinfo 2b6f293ab656673fac621db7d5c69df309028530 344384 duplicity_0.7.17-2_amd64.deb Checksums-Sha256: 038cdb97f2f615f781059065ffc6d17894a92a82c5331f0815a79c06219d382c 1879 duplicity_0.7.17-2.dsc 040d44db5d49cfae56bc228eb082b13cb11ab928b4e21ee593ebc3ff86a7e3d5 18800 duplicity_0.7.17-2.debian.tar.xz 488f214862808b878a8881e98b4505a151776b199f15c4e53fd1a72f852b708c 15004 duplicity-dbgsym_0.7.17-2_amd64.deb 3f6556d5420507d58525fe4763138d74607c5a699ae5b87876549fcddd21f0d9 8758 duplicity_0.7.17-2_amd64.buildinfo 734bc7cff7aeaf0f541a1a8ed5bb255d0ecba7078c41cd1134d94cc821defc90 344384 duplicity_0.7.17-2_amd64.deb Files: 70328e15cfa77df35d06e387fff97e6f 1879 utils optional duplicity_0.7.17-2.dsc f712a7d9b990b24150c25340cc771fe9 18800 utils optional duplicity_0.7.17-2.debian.tar.xz 7178db57f668b848ab30fba4bc385113 15004 debug optional duplicity-dbgsym_0.7.17-2_amd64.deb f3f1bebf97d6d0811403a62cd465b952 8758 utils optional duplicity_0.7.17-2_amd64.buildinfo 5d4404de5dbd668e36a8d692d35beab9 344384 utils optional duplicity_0.7.17-2_amd64.deb -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJbeoivAAoJED06g4g30PqNzYwQALs9sNpG3goSn+DhOewMzPUa XnopmpzeS9aLC+qb0FoYdXSXAyRLBZmoEyyGZWPMhGdbZRVqVwfSL5tYW4zU42go Z/zE8O9Bah/4BhOR4uvIjPyZYwLz9pyS1KifCDfeGiFXZCYJXH1Bz/5xSIZyXWYe JA4k5gCHWKKus0ZQbi8DViivP8atHhpEXxODUrOYlvWR+RE09ot25NkDiI+Vqd5B zcmLyPxix0ujPWphL3TFuI+J7oyStTdWPhFLgwIrCiq4oiEtRby/x3A53ihAE9OY Mt7psg6zYIe8ttAVMbYD7DNunkCoOBCnaclwqc6oR8BzAHZRFoz6BrWp4YCk27yj c1Abdv1yJdqJtzzP12XuaPE+6hWwMm9sfoAb4F73DBLoOxl+VMCgz5Wm2oeevfKA sWJovcyOfM9e1xuivDkFi1GaSkcVwzNMFJBx1PnkHg2wlkblSz1Xdzr+5prfiyv1 rfRhXxs/GR/pgxbBl4105d1XoC82te2VAkxsvKckmWtwhC9WSKZizWLowp2Enx9K CxJ1ho+NpVCnaO/hKl9D9BHQOdBcKAygrE/+uyDTN06hfE0ACYZ/VyNblxw0of1w +2CG6T7yF0nQq7bwDM+HhKCkDydvUb77oiRRiXFGJfS90Si2IU1y1A/pX8gLihUU zZSb5fE98lmHUbJgEQ3+ =9wx8 -----END PGP SIGNATURE-----
--- End Message ---