Source: postgresql-17 Version: 17.3-2 Severity: serious Justification: FTBFS Tags: trixie sid ftbfs User: lu...@debian.org Usertags: ftbfs-20250215 ftbfs-trixie
Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part (hopefully): > make[2]: Entering directory > '/build/reproducible-path/postgresql-17-17.3/build/src/test/ssl' > echo "# +++ tap check in src/test/ssl +++" && rm -rf > '/build/reproducible-path/postgresql-17-17.3/build/src/test/ssl'/tmp_check && > /bin/mkdir -p > '/build/reproducible-path/postgresql-17-17.3/build/src/test/ssl'/tmp_check && > cd /build/reproducible-path/postgresql-17-17.3/build/../src/test/ssl && > TESTLOGDIR='/build/reproducible-path/postgresql-17-17.3/build/src/test/ssl/tmp_check/log' > > TESTDATADIR='/build/reproducible-path/postgresql-17-17.3/build/src/test/ssl/tmp_check' > > PATH="/build/reproducible-path/postgresql-17-17.3/build/tmp_install/usr/lib/postgresql/17/bin:/build/reproducible-path/postgresql-17-17.3/build/src/test/ssl:$PATH" > > LD_LIBRARY_PATH="/build/reproducible-path/postgresql-17-17.3/build/tmp_install/usr/lib/x86_64-linux-gnu" > > INITDB_TEMPLATE='/build/reproducible-path/postgresql-17-17.3/build'/tmp_install/initdb-template > PGPORT='65432' > top_builddir='/build/reproducible-path/postgresql-17-17.3/build/src/test/ssl/../../..' > > PG_REGRESS='/build/reproducible-path/postgresql-17-17.3/build/src/test/ssl/../../../src/test/regress/pg_regress' > /usr/bin/prove -I > /build/reproducible-path/postgresql-17-17.3/build/../src/test/perl/ -I > /build/reproducible-path/postgresql-17-17.3/build/../src/test/ssl --verbose > t/*.pl > # +++ tap check in src/test/ssl +++ > > # Failed test 'pg_stat_ssl with client certificate: exit code 0' > # at t/001_ssltests.pl line 731. > > # Failed test 'pg_stat_ssl with client certificate: no stderr' > # at t/001_ssltests.pl line 731. > # got: 'psql: error: connection to server at "127.0.0.1", port 23938 > failed: Connection refused > # Is the server running on that host and accepting TCP/IP connections? > # ' > # expected: '' > > # Failed test 'pg_stat_ssl with client certificate: matches' > # at t/001_ssltests.pl line 731. > # '' > # doesn't match > '(?^mx:^pid,ssl,version,cipher,bits,client_dn,client_serial,issuer_dn\r?\n > # > ^\d+,t,TLSv[\d.]+,[\w-]+,\d+,/?CN=ssltestuser,\d+,/?CN\=Test\ CA\ for\ > PostgreSQL\ SSL\ regression\ test\ client\ certs\r?$)' > > # Failed test 'certificate authorization fails because of file permissions: > matches' > # at t/001_ssltests.pl line 755. > # 'psql: error: connection to server at "127.0.0.1", port > 23938 failed: Connection refused > # Is the server running on that host and accepting TCP/IP connections?' > # doesn't match '(?^:private key file \".*client_wrongperms\.key\" has > group or world access)' > > # Failed test 'certificate authorization fails with client cert belonging > to another user: matches' > # at t/001_ssltests.pl line 766. > # 'psql: error: connection to server at "127.0.0.1", port > 23938 failed: Connection refused > # Is the server running on that host and accepting TCP/IP connections?' > # doesn't match '(?^:certificate authentication failed for user > "anotheruser")' > > # Failed test 'certificate authorization fails with revoked client cert: > matches' > # at t/001_ssltests.pl line 778. > # 'psql: error: connection to server at "127.0.0.1", port > 23938 failed: Connection refused > # Is the server running on that host and accepting TCP/IP connections?' > # doesn't match '(?^:SSL error: ssl[a-z0-9/]* alert certificate revoked)' > > # Failed test 'auth_option clientcert=verify-full succeeds with matching > username and Common Name' > # at t/001_ssltests.pl line 797. > # got: '2' > # expected: '0' > > # Failed test 'auth_option clientcert=verify-full succeeds with matching > username and Common Name: no stderr' > # at t/001_ssltests.pl line 797. > # got: 'psql: error: connection to server at "127.0.0.1", port 23938 > failed: Connection refused > # Is the server running on that host and accepting TCP/IP connections?' > # expected: '' > > # Failed test 'auth_option clientcert=verify-full succeeds with matching > username and Common Name: log matches' > # at > /build/reproducible-path/postgresql-17-17.3/build/../src/test/perl/PostgreSQL/Test/Cluster.pm > line 2445. > # '' > # doesn't match '(?^:connection authenticated: user="ssltestuser" > method=trust)' > > # Failed test 'auth_option clientcert=verify-full fails with mismatching > username and Common Name: matches' > # at t/001_ssltests.pl line 804. > # 'psql: error: connection to server at "127.0.0.1", port > 23938 failed: Connection refused > # Is the server running on that host and accepting TCP/IP connections?' > # doesn't match '(?^:FATAL: .* "trust" authentication failed for user > "anotheruser")' > > # Failed test 'auth_option clientcert=verify-ca succeeds with mismatching > username and Common Name' > # at t/001_ssltests.pl line 815. > # got: '2' > # expected: '0' > > # Failed test 'auth_option clientcert=verify-ca succeeds with mismatching > username and Common Name: no stderr' > # at t/001_ssltests.pl line 815. > # got: 'psql: error: connection to server at "127.0.0.1", port 23938 > failed: Connection refused > # Is the server running on that host and accepting TCP/IP connections?' > # expected: '' > > # Failed test 'auth_option clientcert=verify-ca succeeds with mismatching > username and Common Name: log matches' > # at > /build/reproducible-path/postgresql-17-17.3/build/../src/test/perl/PostgreSQL/Test/Cluster.pm > line 2445. > # '' > # doesn't match '(?^:connection authenticated: user="yetanotheruser" > method=trust)' > # Looks like you failed 13 tests of 205. > t/001_ssltests.pl .. > # setting up data directory > # initializing database system by copying initdb template > ok 1 - ssl_library parameter > # testing password-protected keys > ok 2 - restart fails with password-protected key file with wrong password > ok 3 - restart succeeds with password-protected key file > ok 4 - restart fails with incorrect SSL protocol bounds > ok 5 - restart succeeds with correct SSL protocol bounds > # running client tests > ok 6 - server doesn't accept non-SSL connections > ok 7 - server doesn't accept non-SSL connections: matches > ok 8 - connect without server root cert sslmode=require > ok 9 - connect without server root cert sslmode=require: no stderr > ok 10 - connect without server root cert sslmode=verify-ca > ok 11 - connect without server root cert sslmode=verify-ca: matches > ok 12 - connect without server root cert sslmode=verify-full > ok 13 - connect without server root cert sslmode=verify-full: matches > ok 14 - connect with wrong server root cert sslmode=require > ok 15 - connect with wrong server root cert sslmode=require: matches > ok 16 - connect with wrong server root cert sslmode=verify-ca > ok 17 - connect with wrong server root cert sslmode=verify-ca: matches > ok 18 - connect with wrong server root cert sslmode=verify-full > ok 19 - connect with wrong server root cert sslmode=verify-full: matches > ok 20 - connect with server CA cert, without root CA > ok 21 - connect with server CA cert, without root CA: matches > ok 22 - connect with correct server CA cert file sslmode=require > ok 23 - connect with correct server CA cert file sslmode=require: no stderr > ok 24 - connect with correct server CA cert file sslmode=verify-ca > ok 25 - connect with correct server CA cert file sslmode=verify-ca: no stderr > ok 26 - connect with correct server CA cert file sslmode=verify-full > ok 27 - connect with correct server CA cert file sslmode=verify-full: no > stderr > ok 28 - cert root file that contains two certificates, order 1 > ok 29 - cert root file that contains two certificates, order 1: no stderr > ok 30 - cert root file that contains two certificates, order 2 > ok 31 - cert root file that contains two certificates, order 2: no stderr > ok 32 - connect with sslcertmode=disable > ok 33 - connect with sslcertmode=disable: no stderr > ok 34 - connect with sslcertmode=allow > ok 35 - connect with sslcertmode=allow: no stderr > ok 36 - connect with sslcertmode=require fails without a client certificate > ok 37 - connect with sslcertmode=require fails without a client certificate: > matches > ok 38 - sslcrl option with invalid file name > ok 39 - sslcrl option with invalid file name: no stderr > ok 40 - CRL belonging to a different CA > ok 41 - CRL belonging to a different CA: matches > ok 42 - directory CRL belonging to a different CA > ok 43 - directory CRL belonging to a different CA: matches > ok 44 - CRL with a non-revoked cert > ok 45 - CRL with a non-revoked cert: no stderr > ok 46 - directory CRL with a non-revoked cert > ok 47 - directory CRL with a non-revoked cert: no stderr > ok 48 - mismatch between host name and server certificate sslmode=require > ok 49 - mismatch between host name and server certificate sslmode=require: no > stderr > ok 50 - mismatch between host name and server certificate sslmode=verify-ca > ok 51 - mismatch between host name and server certificate sslmode=verify-ca: > no stderr > ok 52 - mismatch between host name and server certificate sslmode=verify-full > ok 53 - mismatch between host name and server certificate > sslmode=verify-full: matches > ok 54 - IP address in the Common Name > ok 55 - IP address in the Common Name: no stderr > ok 56 - mismatch between host name and server certificate IP address > ok 57 - mismatch between host name and server certificate IP address: matches > ok 58 - IP address in a dNSName > ok 59 - IP address in a dNSName: no stderr > ok 60 - host name matching with X.509 Subject Alternative Names 1 > ok 61 - host name matching with X.509 Subject Alternative Names 1: no stderr > ok 62 - host name matching with X.509 Subject Alternative Names 2 > ok 63 - host name matching with X.509 Subject Alternative Names 2: no stderr > ok 64 - host name matching with X.509 Subject Alternative Names wildcard > ok 65 - host name matching with X.509 Subject Alternative Names wildcard: no > stderr > ok 66 - host name not matching with X.509 Subject Alternative Names > ok 67 - host name not matching with X.509 Subject Alternative Names: matches > ok 68 - host name not matching with X.509 Subject Alternative Names wildcard > ok 69 - host name not matching with X.509 Subject Alternative Names wildcard: > matches > ok 70 - host name matching with a single X.509 Subject Alternative Name > ok 71 - host name matching with a single X.509 Subject Alternative Name: no > stderr > ok 72 - host name not matching with a single X.509 Subject Alternative Name > ok 73 - host name not matching with a single X.509 Subject Alternative Name: > matches > ok 74 - host name not matching with a single X.509 Subject Alternative Name > wildcard > ok 75 - host name not matching with a single X.509 Subject Alternative Name > wildcard: matches > ok 76 - host matching an IPv4 address (Subject Alternative Name 1) > ok 77 - host matching an IPv4 address (Subject Alternative Name 1): no stderr > ok 78 - host matching an IPv4 address in alternate form (Subject Alternative > Name 1) > ok 79 - host matching an IPv4 address in alternate form (Subject Alternative > Name 1): no stderr > ok 80 - host not matching an IPv4 address (Subject Alternative Name 1) > ok 81 - host not matching an IPv4 address (Subject Alternative Name 1): > matches > ok 82 - host matching an IPv6 address (Subject Alternative Name 2) > ok 83 - host matching an IPv6 address (Subject Alternative Name 2): no stderr > ok 84 - host matching an IPv6 address in alternate form (Subject Alternative > Name 2) > ok 85 - host matching an IPv6 address in alternate form (Subject Alternative > Name 2): no stderr > ok 86 - host matching an IPv6 address in mixed form (Subject Alternative Name > 2) > ok 87 - host matching an IPv6 address in mixed form (Subject Alternative Name > 2): no stderr > ok 88 - host not matching an IPv6 address (Subject Alternative Name 2) > ok 89 - host not matching an IPv6 address (Subject Alternative Name 2): > matches > ok 90 - IPv6 host with CIDR mask does not match > ok 91 - IPv6 host with CIDR mask does not match: matches > ok 92 - certificate with both a CN and SANs 1 > ok 93 - certificate with both a CN and SANs 1: no stderr > ok 94 - certificate with both a CN and SANs 2 > ok 95 - certificate with both a CN and SANs 2: no stderr > ok 96 - certificate with both a CN and SANs ignores CN > ok 97 - certificate with both a CN and SANs ignores CN: matches > ok 98 - certificate with both a CN and IP SANs matches CN > ok 99 - certificate with both a CN and IP SANs matches CN: no stderr > ok 100 - certificate with both a CN and IP SANs matches SAN 1 > ok 101 - certificate with both a CN and IP SANs matches SAN 1: no stderr > ok 102 - certificate with both a CN and IP SANs matches SAN 2 > ok 103 - certificate with both a CN and IP SANs matches SAN 2: no stderr > ok 104 - certificate with both an IP CN and IP SANs 1 > ok 105 - certificate with both an IP CN and IP SANs 1: no stderr > ok 106 - certificate with both an IP CN and IP SANs 2 > ok 107 - certificate with both an IP CN and IP SANs 2: no stderr > ok 108 - certificate with both an IP CN and IP SANs ignores CN > ok 109 - certificate with both an IP CN and IP SANs ignores CN: matches > ok 110 - certificate with both an IP CN and DNS SANs matches CN > ok 111 - certificate with both an IP CN and DNS SANs matches CN: no stderr > ok 112 - certificate with both an IP CN and DNS SANs matches SAN 1 > ok 113 - certificate with both an IP CN and DNS SANs matches SAN 1: no stderr > ok 114 - certificate with both an IP CN and DNS SANs matches SAN 2 > ok 115 - certificate with both an IP CN and DNS SANs matches SAN 2: no stderr > ok 116 - server certificate without CN or SANs sslmode=verify-ca > ok 117 - server certificate without CN or SANs sslmode=verify-ca: no stderr > ok 118 - server certificate without CN or SANs sslmode=verify-full > ok 119 - server certificate without CN or SANs sslmode=verify-full: matches > ok 120 - sslrootcert=system does not connect with private CA > ok 121 - sslrootcert=system does not connect with private CA: matches > ok 122 - sslrootcert=system only accepts sslmode=verify-full > ok 123 - sslrootcert=system only accepts sslmode=verify-full: matches > ok 124 - sslrootcert=system connects with overridden SSL_CERT_FILE > ok 125 - sslrootcert=system connects with overridden SSL_CERT_FILE: no stderr > ok 126 - sslrootcert=system defaults to sslmode=verify-full > ok 127 - sslrootcert=system defaults to sslmode=verify-full: matches > ok 128 - connects without client-side CRL > ok 129 - connects without client-side CRL: no stderr > ok 130 - does not connect with client-side CRL file > ok 131 - does not connect with client-side CRL file: matches > ok 132 - does not connect with client-side CRL directory > ok 133 - does not connect with client-side CRL directory: matches > ok 134 - pg_stat_ssl view without client certificate: exit code 0 > ok 135 - pg_stat_ssl view without client certificate: no stderr > ok 136 - pg_stat_ssl view without client certificate: matches > ok 137 - connection success with correct range of TLS protocol versions > ok 138 - connection success with correct range of TLS protocol versions: no > stderr > ok 139 - connection failure with incorrect range of TLS protocol versions > ok 140 - connection failure with incorrect range of TLS protocol versions: > matches > ok 141 - connection failure with an incorrect SSL protocol minimum bound > ok 142 - connection failure with an incorrect SSL protocol minimum bound: > matches > ok 143 - connection failure with an incorrect SSL protocol maximum bound > ok 144 - connection failure with an incorrect SSL protocol maximum bound: > matches > # running server tests > ok 145 - certificate authorization fails without client cert > ok 146 - certificate authorization fails without client cert: matches > ok 147 - certificate authorization succeeds with correct client cert in PEM > format > ok 148 - certificate authorization succeeds with correct client cert in PEM > format: no stderr > ok 149 - certificate authorization succeeds with correct client cert in DER > format > ok 150 - certificate authorization succeeds with correct client cert in DER > format: no stderr > ok 151 - certificate authorization succeeds with correct client cert in > encrypted PEM format > ok 152 - certificate authorization succeeds with correct client cert in > encrypted PEM format: no stderr > ok 153 - certificate authorization succeeds with correct client cert in > encrypted DER format > ok 154 - certificate authorization succeeds with correct client cert in > encrypted DER format: no stderr > ok 155 - certificate authorization succeeds with correct client cert and > sslcertmode=require > ok 156 - certificate authorization succeeds with correct client cert and > sslcertmode=require: no stderr > ok 157 - certificate authorization succeeds with correct client cert and > sslcertmode=allow > ok 158 - certificate authorization succeeds with correct client cert and > sslcertmode=allow: no stderr > ok 159 - certificate authorization fails with correct client cert and > sslcertmode=disable > ok 160 - certificate authorization fails with correct client cert and > sslcertmode=disable: matches > ok 161 - certificate authorization fails with correct client cert and wrong > password in encrypted PEM format > ok 162 - certificate authorization fails with correct client cert and wrong > password in encrypted PEM format: matches > ok 163 - certificate authorization succeeds with DN mapping > ok 164 - certificate authorization succeeds with DN mapping: no stderr > ok 165 - certificate authorization succeeds with DN mapping: log matches > ok 166 - certificate authorization succeeds with DN regex mapping > ok 167 - certificate authorization succeeds with DN regex mapping: no stderr > ok 168 - certificate authorization succeeds with CN mapping > ok 169 - certificate authorization succeeds with CN mapping: no stderr > ok 170 - certificate authorization succeeds with CN mapping: log matches > not ok 171 # TODO & SKIP Need Pty support > not ok 172 # TODO & SKIP Need Pty support > not ok 173 # TODO & SKIP Need Pty support > not ok 174 # TODO & SKIP Need Pty support > not ok 175 - pg_stat_ssl with client certificate: exit code 0 > not ok 176 - pg_stat_ssl with client certificate: no stderr > not ok 177 - pg_stat_ssl with client certificate: matches > ok 178 - certificate authorization fails because of file permissions > not ok 179 - certificate authorization fails because of file permissions: > matches > ok 180 - certificate authorization fails with client cert belonging to > another user > not ok 181 - certificate authorization fails with client cert belonging to > another user: matches > ok 182 - certificate authorization fails with revoked client cert > not ok 183 - certificate authorization fails with revoked client cert: matches > ok 184 - certificate authorization fails with revoked client cert: log does > not match > not ok 185 - auth_option clientcert=verify-full succeeds with matching > username and Common Name > not ok 186 - auth_option clientcert=verify-full succeeds with matching > username and Common Name: no stderr > not ok 187 - auth_option clientcert=verify-full succeeds with matching > username and Common Name: log matches > ok 188 - auth_option clientcert=verify-full fails with mismatching username > and Common Name > not ok 189 - auth_option clientcert=verify-full fails with mismatching > username and Common Name: matches > ok 190 - auth_option clientcert=verify-full fails with mismatching username > and Common Name: log does not match > not ok 191 - auth_option clientcert=verify-ca succeeds with mismatching > username and Common Name > not ok 192 - auth_option clientcert=verify-ca succeeds with mismatching > username and Common Name: no stderr > not ok 193 - auth_option clientcert=verify-ca succeeds with mismatching > username and Common Name: log matches > ok 194 - intermediate client certificate is provided by client > ok 195 - intermediate client certificate is provided by client: no stderr > ok 196 - intermediate client certificate is missing > ok 197 - intermediate client certificate is missing: matches > ok 198 - logged client certificate Subjects are truncated if they're too long > ok 199 - logged client certificate Subjects are truncated if they're too > long: matches > ok 200 - intermediate client certificate is untrusted > ok 201 - intermediate client certificate is untrusted: matches > ok 202 - certificate authorization fails with revoked client cert with > server-side CRL directory > ok 203 - certificate authorization fails with revoked client cert with > server-side CRL directory: matches > ok 204 - certificate authorization fails with revoked UTF-8 client cert with > server-side CRL directory > ok 205 - certificate authorization fails with revoked UTF-8 client cert with > server-side CRL directory: matches > 1..205 > Dubious, test returned 13 (wstat 3328, 0xd00) > Failed 13/205 subtests > t/002_scram.pl ..... > # setting up data directory > # initializing database system by copying initdb template > ok 1 - Basic SCRAM authentication with SSL > ok 2 - Basic SCRAM authentication with SSL: no stderr > ok 3 - SCRAM with SSL and channel_binding=invalid_value > ok 4 - SCRAM with SSL and channel_binding=invalid_value: matches > ok 5 - SCRAM with SSL and channel_binding=disable > ok 6 - SCRAM with SSL and channel_binding=disable: no stderr > ok 7 - SCRAM with SSL and channel_binding=require > ok 8 - SCRAM with SSL and channel_binding=require: no stderr > ok 9 - MD5 with SSL and channel_binding=require > ok 10 - MD5 with SSL and channel_binding=require: matches > ok 11 - Cert authentication and channel_binding=require > ok 12 - Cert authentication and channel_binding=require: matches > ok 13 - SCRAM with clientcert=verify-full > ok 14 - SCRAM with clientcert=verify-full: no stderr > ok 15 - SCRAM with clientcert=verify-full: log matches > ok 16 - SCRAM with SSL, channel_binding=disable, and > require_auth=scram-sha-256 > ok 17 - SCRAM with SSL, channel_binding=disable, and > require_auth=scram-sha-256: no stderr > ok 18 - channel_binding can fail even when require_auth succeeds > ok 19 - channel_binding can fail even when require_auth succeeds: matches > ok 20 - SCRAM with SSL, channel_binding=require, and > require_auth=scram-sha-256 > ok 21 - SCRAM with SSL, channel_binding=require, and > require_auth=scram-sha-256: no stderr > ok 22 - SCRAM with SSL and channel_binding=require, server certificate uses > 'rsassaPss' > ok 23 - SCRAM with SSL and channel_binding=require, server certificate uses > 'rsassaPss': no stderr > ok 24 - SCRAM with SSL and channel_binding=require, server certificate uses > 'rsassaPss': log matches > 1..24 > ok > t/003_sslinfo.pl ... > # setting up data directory > # initializing database system by copying initdb template > ok 1 - certificate authorization succeeds with correct client cert in PEM > format > ok 2 - certificate authorization succeeds with correct client cert in PEM > format: no stderr > ok 3 - ssl_is_used() for TLS connection > ok 4 - ssl_version() correctly returning TLS protocol > ok 5 - ssl_cipher() compared with pg_stat_ssl > ok 6 - ssl_client_cert_present() for connection with cert > ok 7 - ssl_client_cert_present() for connection without cert > ok 8 - ssl_client_serial() compared with pg_stat_ssl > ok 9 - ssl_client_dn_field() for an invalid field > ok 10 - ssl_client_dn_field() for connection without cert > ok 11 - ssl_client_dn_field() for commonName > ok 12 - ssl_issuer_dn() for connection with cert > ok 13 - ssl_issuer_field() for commonName > ok 14 - extract extension from cert > ok 15 - ssl_client_cert_present() for sslcertmode=allow > ok 16 - ssl_client_cert_present() for sslcertmode=allow sslcert=invalid > ok 17 - ssl_client_cert_present() for sslcertmode=disable > ok 18 - ssl_client_cert_present() for sslcertmode=require > 1..18 > ok > > Test Summary Report > ------------------- > t/001_ssltests.pl (Wstat: 3328 (exited 13) Tests: 205 Failed: 13) > Failed tests: 175-177, 179, 181, 183, 185-187, 189, 191-193 > Non-zero exit status: 13 > Files=3, Tests=247, 15 wallclock secs ( 0.08 usr 0.00 sys + 2.57 cusr 2.18 > csys = 4.83 CPU) > Result: FAIL > make[2]: *** [Makefile:32: check] Error 1 The full build log is available from: http://qa-logs.debian.net/2025/02/15/postgresql-17_17.3-2_unstable.log All bugs filed during this archive rebuild are listed at: https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20250215;users=lu...@debian.org or: https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20250215&fusertaguser=lu...@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! If you reassign this bug to another package, please mark it as 'affects'-ing this package. See https://www.debian.org/Bugs/server-control#affects If you fail to reproduce this, please provide a build log and diff it with mine so that we can identify if something relevant changed in the meantime.