Your message dated Tue, 12 Jan 2021 06:03:28 +0000
with message-id <e1kzcm8-000hig...@fasolo.debian.org>
and subject line Bug#954402: fixed in m2crypto 0.37.1-1
has caused the Debian Bug report #954402,
regarding m2crypto FTBFS with pytest 6
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
954402: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954402
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: m2crypto
Version: 0.36.0-1
Severity: important
User: pyt...@packages.debian.org
Usertags: pytest-v6
Hi,
m2crypto FTBFS with pytest 6 in experimental.
The error log below has more details.
> I: pybuild base:232: cd
> /<<PKGBUILDDIR>>/.pybuild/cpython3_3.9_m2crypto/build; python3.9 -m pytest
> tests
> ============================= test session starts
> ==============================
> platform linux -- Python 3.9.1, pytest-6.0.2, py-1.9.0, pluggy-0.13.0
> rootdir: /<<PKGBUILDDIR>>
> collected 302 items
>
> tests/test_aes.py .... [
> 1%]
> tests/test_asn1.py ........ [
> 3%]
> tests/test_authcookie.py ................... [
> 10%]
> tests/test_bio.py . [
> 10%]
> tests/test_bio_file.py ....... [
> 12%]
> tests/test_bio_iobuf.py ........ [
> 15%]
> tests/test_bio_membuf.py .......... [
> 18%]
> tests/test_bio_ssl.py ....... [
> 21%]
> tests/test_bn.py ... [
> 22%]
> tests/test_dh.py ...... [
> 24%]
> tests/test_dsa.py ........... [
> 27%]
> tests/test_ec_curves.py .. [
> 28%]
> tests/test_ecdh.py ... [
> 29%]
> tests/test_ecdsa.py ....... [
> 31%]
> tests/test_engine.py ...... [
> 33%]
> tests/test_err.py . [
> 34%]
> tests/test_evp.py ........................ [
> 42%]
> tests/test_obj.py ...... [
> 44%]
> tests/test_rand.py ...... [
> 46%]
> tests/test_rc4.py .. [
> 46%]
> tests/test_rsa.py .......................... [
> 55%]
> tests/test_smime.py ..................... [
> 62%]
> tests/test_ssl.py ...s.........................FFF.F.......s............ [
> 80%]
> ... [
> 81%]
> tests/test_ssl_offline.py ..... [
> 82%]
> tests/test_threading.py .. [
> 83%]
> tests/test_timeout.py ............... [
> 88%]
> tests/test_util.py ........ [
> 91%]
> tests/test_x509.py ...........................
> [100%]
>
> =================================== FAILURES
> ===================================
> ___________________ MiscSSLClientTestCase.test_verify_cb_new
> ___________________
>
> self = <tests.test_ssl.MiscSSLClientTestCase testMethod=test_verify_cb_new>
>
> def test_verify_cb_new(self):
> pid = self.start_server(self.args)
> try:
> ctx = SSL.Context()
> ctx.set_verify(SSL.verify_peer | SSL.verify_fail_if_no_peer_cert,
> 9, self.verify_cb_new)
> s = SSL.Connection(ctx)
> try:
>> s.connect(self.srv_addr)
>
> tests/test_ssl.py:521:
> _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
> _
>
> self = <M2Crypto.SSL.Connection.Connection object at 0x7f5c43c388e0>
> addr = ('localhost', 43785)
>
> def connect(self, addr):
> # type: (util.AddrType) -> int
> """Overloading socket.connect()
>
> :param addr: addresses have various depending on their type
>
> :return:status of ssl_connect()
> """
> self.socket.connect(addr)
> self.addr = addr
> self.setup_ssl()
> self.set_connect_state()
>> ret = self.connect_ssl()
>
> M2Crypto/SSL/Connection.py:327:
> _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
> _
>
> self = <M2Crypto.SSL.Connection.Connection object at 0x7f5c43c388e0>
>
> def connect_ssl(self):
> # type: () -> Optional[int]
>> return m2.ssl_connect(self.ssl, self._timeout)
> E M2Crypto.SSL.SSLError: certificate verify failed
>
> M2Crypto/SSL/Connection.py:313: SSLError
>
> During handling of the above exception, another exception occurred:
>
> self = <tests.test_ssl.MiscSSLClientTestCase testMethod=test_verify_cb_new>
>
> def test_verify_cb_new(self):
> pid = self.start_server(self.args)
> try:
> ctx = SSL.Context()
> ctx.set_verify(SSL.verify_peer | SSL.verify_fail_if_no_peer_cert,
> 9, self.verify_cb_new)
> s = SSL.Connection(ctx)
> try:
> s.connect(self.srv_addr)
> except SSL.SSLError as e:
>> self.fail(e)
> E AssertionError: certificate verify failed
>
> tests/test_ssl.py:523: AssertionError
> ________________ MiscSSLClientTestCase.test_verify_cb_new_class
> ________________
>
> self = <tests.test_ssl.MiscSSLClientTestCase
> testMethod=test_verify_cb_new_class>
>
> def test_verify_cb_new_class(self):
> pid = self.start_server(self.args)
> try:
> ctx = SSL.Context()
> ctx.set_verify(SSL.verify_peer | SSL.verify_fail_if_no_peer_cert,
> 9, VerifyCB())
> s = SSL.Connection(ctx)
> try:
>> s.connect(self.srv_addr)
>
> tests/test_ssl.py:538:
> _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
> _
>
> self = <M2Crypto.SSL.Connection.Connection object at 0x7f5c433477c0>
> addr = ('localhost', 35013)
>
> def connect(self, addr):
> # type: (util.AddrType) -> int
> """Overloading socket.connect()
>
> :param addr: addresses have various depending on their type
>
> :return:status of ssl_connect()
> """
> self.socket.connect(addr)
> self.addr = addr
> self.setup_ssl()
> self.set_connect_state()
>> ret = self.connect_ssl()
>
> M2Crypto/SSL/Connection.py:327:
> _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
> _
>
> self = <M2Crypto.SSL.Connection.Connection object at 0x7f5c433477c0>
>
> def connect_ssl(self):
> # type: () -> Optional[int]
>> return m2.ssl_connect(self.ssl, self._timeout)
> E M2Crypto.SSL.SSLError: certificate verify failed
>
> M2Crypto/SSL/Connection.py:313: SSLError
>
> During handling of the above exception, another exception occurred:
>
> self = <tests.test_ssl.MiscSSLClientTestCase
> testMethod=test_verify_cb_new_class>
>
> def test_verify_cb_new_class(self):
> pid = self.start_server(self.args)
> try:
> ctx = SSL.Context()
> ctx.set_verify(SSL.verify_peer | SSL.verify_fail_if_no_peer_cert,
> 9, VerifyCB())
> s = SSL.Connection(ctx)
> try:
> s.connect(self.srv_addr)
> except SSL.SSLError as e:
> log.exception(e)
>> self.fail(e)
> E AssertionError: certificate verify failed
>
> tests/test_ssl.py:541: AssertionError
> ------------------------------ Captured log call
> -------------------------------
> ERROR test_SSL:test_ssl.py:540 certificate verify failed
> Traceback (most recent call last):
> File
> "/<<PKGBUILDDIR>>/.pybuild/cpython3_3.9_m2crypto/build/tests/test_ssl.py",
> line 538, in test_verify_cb_new_class
> s.connect(self.srv_addr)
> File
> "/<<PKGBUILDDIR>>/.pybuild/cpython3_3.9_m2crypto/build/M2Crypto/SSL/Connection.py",
> line 327, in connect
> ret = self.connect_ssl()
> File
> "/<<PKGBUILDDIR>>/.pybuild/cpython3_3.9_m2crypto/build/M2Crypto/SSL/Connection.py",
> line 313, in connect_ssl
> return m2.ssl_connect(self.ssl, self._timeout)
> M2Crypto.SSL.SSLError: certificate verify failed
> ______________ MiscSSLClientTestCase.test_verify_cb_new_function
> _______________
>
> self = <tests.test_ssl.MiscSSLClientTestCase
> testMethod=test_verify_cb_new_function>
>
> def test_verify_cb_new_function(self):
> pid = self.start_server(self.args)
> try:
> ctx = SSL.Context()
> ctx.set_verify(SSL.verify_peer | SSL.verify_fail_if_no_peer_cert,
> 9, verify_cb_new_function)
> s = SSL.Connection(ctx)
> try:
>> s.connect(self.srv_addr)
>
> tests/test_ssl.py:556:
> _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
> _
>
> self = <M2Crypto.SSL.Connection.Connection object at 0x7f5c43130d30>
> addr = ('localhost', 46641)
>
> def connect(self, addr):
> # type: (util.AddrType) -> int
> """Overloading socket.connect()
>
> :param addr: addresses have various depending on their type
>
> :return:status of ssl_connect()
> """
> self.socket.connect(addr)
> self.addr = addr
> self.setup_ssl()
> self.set_connect_state()
>> ret = self.connect_ssl()
>
> M2Crypto/SSL/Connection.py:327:
> _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
> _
>
> self = <M2Crypto.SSL.Connection.Connection object at 0x7f5c43130d30>
>
> def connect_ssl(self):
> # type: () -> Optional[int]
>> return m2.ssl_connect(self.ssl, self._timeout)
> E M2Crypto.SSL.SSLError: certificate verify failed
>
> M2Crypto/SSL/Connection.py:313: SSLError
>
> During handling of the above exception, another exception occurred:
>
> self = <tests.test_ssl.MiscSSLClientTestCase
> testMethod=test_verify_cb_new_function>
>
> def test_verify_cb_new_function(self):
> pid = self.start_server(self.args)
> try:
> ctx = SSL.Context()
> ctx.set_verify(SSL.verify_peer | SSL.verify_fail_if_no_peer_cert,
> 9, verify_cb_new_function)
> s = SSL.Connection(ctx)
> try:
> s.connect(self.srv_addr)
> except SSL.SSLError as e:
>> self.fail(e)
> E AssertionError: certificate verify failed
>
> tests/test_ssl.py:558: AssertionError
> ___________________ MiscSSLClientTestCase.test_verify_cb_old
> ___________________
>
> self = <tests.test_ssl.MiscSSLClientTestCase testMethod=test_verify_cb_old>
>
> def test_verify_cb_old(self):
> with warnings.catch_warnings():
> warnings.simplefilter("ignore", DeprecationWarning)
> pid = self.start_server(self.args)
> try:
> ctx = SSL.Context()
> ctx.set_verify(
> SSL.verify_peer | SSL.verify_fail_if_no_peer_cert,
> 9, self.verify_cb_old)
> s = SSL.Connection(ctx)
> try:
>> s.connect(self.srv_addr)
>
> tests/test_ssl.py:646:
> _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
> _
>
> self = <M2Crypto.SSL.Connection.Connection object at 0x7f5c43347880>
> addr = ('localhost', 46533)
>
> def connect(self, addr):
> # type: (util.AddrType) -> int
> """Overloading socket.connect()
>
> :param addr: addresses have various depending on their type
>
> :return:status of ssl_connect()
> """
> self.socket.connect(addr)
> self.addr = addr
> self.setup_ssl()
> self.set_connect_state()
>> ret = self.connect_ssl()
>
> M2Crypto/SSL/Connection.py:327:
> _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
> _
>
> self = <M2Crypto.SSL.Connection.Connection object at 0x7f5c43347880>
>
> def connect_ssl(self):
> # type: () -> Optional[int]
>> return m2.ssl_connect(self.ssl, self._timeout)
> E M2Crypto.SSL.SSLError: certificate verify failed
>
> M2Crypto/SSL/Connection.py:313: SSLError
>
> During handling of the above exception, another exception occurred:
>
> self = <tests.test_ssl.MiscSSLClientTestCase testMethod=test_verify_cb_old>
>
> def test_verify_cb_old(self):
> with warnings.catch_warnings():
> warnings.simplefilter("ignore", DeprecationWarning)
> pid = self.start_server(self.args)
> try:
> ctx = SSL.Context()
> ctx.set_verify(
> SSL.verify_peer | SSL.verify_fail_if_no_peer_cert,
> 9, self.verify_cb_old)
> s = SSL.Connection(ctx)
> try:
> s.connect(self.srv_addr)
> except SSL.SSLError as e:
>> self.fail(e)
> E AssertionError: certificate verify failed
>
> tests/test_ssl.py:648: AssertionError
> =============================== warnings summary
> ===============================
> M2Crypto/m2crypto.py:13
>
> /<<PKGBUILDDIR>>/.pybuild/cpython3_3.9_m2crypto/build/M2Crypto/m2crypto.py:13:
> DeprecationWarning: the imp module is deprecated in favour of importlib; see
> the module's documentation for alternative uses
> import imp
>
> M2Crypto/SSL/Checker.py:67
>
> /<<PKGBUILDDIR>>/.pybuild/cpython3_3.9_m2crypto/build/M2Crypto/SSL/Checker.py:67:
> DeprecationWarning: invalid escape sequence \.
> numericIpMatch = re.compile('^[0-9]+(\.[0-9]+)*$')
>
> M2Crypto/SSL/Checker.py:257
>
> /<<PKGBUILDDIR>>/.pybuild/cpython3_3.9_m2crypto/build/M2Crypto/SSL/Checker.py:257:
> DeprecationWarning: invalid escape sequence \.
> certHost = certHost.replace('.', '\.')
>
> M2Crypto/SSL/Checker.py:258
>
> /<<PKGBUILDDIR>>/.pybuild/cpython3_3.9_m2crypto/build/M2Crypto/SSL/Checker.py:258:
> DeprecationWarning: invalid escape sequence \.
> certHost = certHost.replace('*', '[^\.]*')
>
> .pybuild/cpython3_3.9_m2crypto/build/tests/test_obj.py::ObjectsTestCase::test_detailed_error_message
>
> /<<PKGBUILDDIR>>/.pybuild/cpython3_3.9_m2crypto/build/tests/test_obj.py:127:
> DeprecationWarning: Please use assertRegex instead.
> self.assertRegexpMatches(str(e),
>
> .pybuild/cpython3_3.9_m2crypto/build/tests/test_ssl.py::TwistedSSLClientTestCase::test_twisted_wrapper
>
> /<<PKGBUILDDIR>>/.pybuild/cpython3_3.9_m2crypto/build/tests/test_ssl.py:1139:
> UserWarning: Skipping twisted wrapper test because twisted not found
> warnings.warn(
>
> -- Docs: https://docs.pytest.org/en/stable/warnings.html
> =========================== short test summary info
> ============================
> FAILED tests/test_ssl.py::MiscSSLClientTestCase::test_verify_cb_new -
> Asserti...
> FAILED tests/test_ssl.py::MiscSSLClientTestCase::test_verify_cb_new_class -
> A...
> FAILED tests/test_ssl.py::MiscSSLClientTestCase::test_verify_cb_new_function
> FAILED tests/test_ssl.py::MiscSSLClientTestCase::test_verify_cb_old -
> Asserti...
> ======= 4 failed, 296 passed, 2 skipped, 6 warnings in 81.00s (0:01:21)
> ========
> E: pybuild pybuild:353: test: plugin distutils failed with: exit code=1: cd
> /<<PKGBUILDDIR>>/.pybuild/cpython3_3.9_m2crypto/build; python3.9 -m pytest
> tests
> rm -fr -- /tmp/dh-xdg-rundir-ZIPYAK7k
> dh_auto_test: error: pybuild --test --test-pytest -i python{version} -p 3.9
> returned exit code 13
> make: *** [debian/rules:17: build] Error 25
> dpkg-buildpackage: error: debian/rules build subprocess returned exit status 2
--- End Message ---
--- Begin Message ---
Source: m2crypto
Source-Version: 0.37.1-1
Done: Sandro Tosi <mo...@debian.org>
We believe that the bug you reported is fixed in the latest version of
m2crypto, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 954...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Sandro Tosi <mo...@debian.org> (supplier of updated m2crypto package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 12 Jan 2021 00:53:00 -0500
Source: m2crypto
Architecture: source
Version: 0.37.1-1
Distribution: unstable
Urgency: medium
Maintainer: Sandro Tosi <mo...@debian.org>
Changed-By: Sandro Tosi <mo...@debian.org>
Closes: 954402
Changes:
m2crypto (0.37.1-1) unstable; urgency=medium
.
[ Ondřej Nový ]
* d/control: Update Vcs-* fields with new Debian Python Team Salsa
layout.
.
[ Sandro Tosi ]
* New upstream release
* Use the new Debian Python Team contact name and address
* debian/copyright
- extend packaging copyright years
* debian/control
- bump Standards-Version to 4.5.1 (no changes needed)
- add parameterized to b-d, needed by tests
* debian/patches/0001-import-inspect-in-urllib-2.patch
- refresh patch
* debian/patches/MR261.patch
- fix compatibility with openssl/1.1.1i+; Closes: #954402
Checksums-Sha1:
685d70a8e5ee7cb03de6d5bee591fee7d97660a5 2334 m2crypto_0.37.1-1.dsc
7e7e74e5e7acf78371c3320e7141d68b3e385cf4 464528 m2crypto_0.37.1.orig.tar.xz
5610f331fa2f2fb359b18230d2e69e681b44c675 58908 m2crypto_0.37.1-1.debian.tar.xz
4f79eb520b3131efe667ab2f4a0365a29c87b91b 8275
m2crypto_0.37.1-1_source.buildinfo
Checksums-Sha256:
10129e7e34d3b19df6cfffa594f801f902c5e8e0e0ac696db989b46c85541dc6 2334
m2crypto_0.37.1-1.dsc
cc0ace6a3fe24e6d3ad78fe1eb507d67b74ae757b01c8c9651d268e67fd7b34c 464528
m2crypto_0.37.1.orig.tar.xz
b7d6c575d349ec7738c225212b9bec456328334e372fe02bcc333ee35d7a185b 58908
m2crypto_0.37.1-1.debian.tar.xz
1a9e89abffa10605ddae3815d68a50d5a3e1c0d6d6e843bf975dbcafb471aedf 8275
m2crypto_0.37.1-1_source.buildinfo
Files:
8c343ff5629302c2cfca41d34681398b 2334 python optional m2crypto_0.37.1-1.dsc
6205f08f2d61b6e87386b69caf6b2b47 464528 python optional
m2crypto_0.37.1.orig.tar.xz
0236bbec39f8e18791da981c02e8e9ae 58908 python optional
m2crypto_0.37.1-1.debian.tar.xz
b903237a72913fe519a8215534d0b6f3 8275 python optional
m2crypto_0.37.1-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=gUcx
-----END PGP SIGNATURE-----
--- End Message ---