Your message dated Mon, 17 Mar 2025 00:29:07 +0000
with message-id <e1ttylr-00dvjf...@fasolo.debian.org>
and subject line Bug#1096226: fixed in receptor 1.5.3-1
has caused the Debian Bug report #1096226,
regarding receptor: FTBFS: dh_auto_test: error
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1096226: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1096226
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: receptor
Version: 1.5.2-1
Severity: serious
Justification: FTBFS
Tags: trixie sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-20250215 ftbfs-trixie
Hi,
During a rebuild of all packages in sid, your package failed to build
on amd64.
Relevant part (hopefully):
> === RUN TestCreateCertReqWithKeyNegative/Negative_test_for_Bits
> ca_test.go:1062: CreateCertReqWithKey() error = rsa: key too small,
> wantErr = crypto/rsa: too few primes of given length to generate an RSA key
> --- FAIL: TestCreateCertReqWithKeyNegative (0.00s)
> --- FAIL: TestCreateCertReqWithKeyNegative/Negative_test_for_Bits (0.00s)
> === RUN TestGetReqNames
> === RUN TestGetReqNames/Positive_test
> --- PASS: TestGetReqNames (0.00s)
> --- PASS: TestGetReqNames/Positive_test (0.00s)
> === RUN TestGetReqNamesNegative
> === RUN TestGetReqNamesNegative/Negative_test
> --- PASS: TestGetReqNamesNegative (0.00s)
> --- PASS: TestGetReqNamesNegative/Negative_test (0.00s)
> === RUN TestLoadCertificate
> === RUN TestLoadCertificate/Positive_test
> --- PASS: TestLoadCertificate (0.00s)
> --- PASS: TestLoadCertificate/Positive_test (0.00s)
> === RUN TestLoadCertificatesNegative
> === RUN TestLoadCertificatesNegative/Negative_multiple_item_test
> === RUN TestLoadCertificatesNegative/Negative_no_certificate_test
> --- PASS: TestLoadCertificatesNegative (0.00s)
> --- PASS: TestLoadCertificatesNegative/Negative_multiple_item_test (0.00s)
> --- PASS: TestLoadCertificatesNegative/Negative_no_certificate_test
> (0.00s)
> === RUN TestLoadFromPEMFile
> === RUN TestLoadFromPEMFile/Certificate
> === RUN TestLoadFromPEMFile/Certificate_Request
> === RUN TestLoadFromPEMFile/RSA_Private_Key
> === RUN TestLoadFromPEMFile/Private_Key
> === RUN TestLoadFromPEMFile/Public_Key
> === RUN TestLoadFromPEMFile/Failed_to_decode
> === RUN TestLoadFromPEMFile/Unknown_block_type
> --- PASS: TestLoadFromPEMFile (0.00s)
> --- PASS: TestLoadFromPEMFile/Certificate (0.00s)
> --- PASS: TestLoadFromPEMFile/Certificate_Request (0.00s)
> --- PASS: TestLoadFromPEMFile/RSA_Private_Key (0.00s)
> --- PASS: TestLoadFromPEMFile/Private_Key (0.00s)
> --- PASS: TestLoadFromPEMFile/Public_Key (0.00s)
> --- PASS: TestLoadFromPEMFile/Failed_to_decode (0.00s)
> --- PASS: TestLoadFromPEMFile/Unknown_block_type (0.00s)
> === RUN TestLoadPrivateKey
> === RUN TestLoadPrivateKey/Positive_Private_Key
> === RUN TestLoadPrivateKey/Negative_multi_item_test
> === RUN TestLoadPrivateKey/Negative_no_private_key_test
> --- PASS: TestLoadPrivateKey (0.00s)
> --- PASS: TestLoadPrivateKey/Positive_Private_Key (0.00s)
> --- PASS: TestLoadPrivateKey/Negative_multi_item_test (0.00s)
> --- PASS: TestLoadPrivateKey/Negative_no_private_key_test (0.00s)
> === RUN TestLoadPublicKey
> === RUN TestLoadPublicKey/Positive_Public_Key
> === RUN TestLoadPublicKey/Negative_multi_item_test
> === RUN TestLoadPublicKey/Negative_no_public_key_test
> --- PASS: TestLoadPublicKey (0.00s)
> --- PASS: TestLoadPublicKey/Positive_Public_Key (0.00s)
> --- PASS: TestLoadPublicKey/Negative_multi_item_test (0.00s)
> --- PASS: TestLoadPublicKey/Negative_no_public_key_test (0.00s)
> === RUN TestLoadRequest
> === RUN TestLoadRequest/Positive_Request
> === RUN TestLoadRequest/Negative_multi_item_test
> === RUN TestLoadRequest/Negative_no_request_test
> --- PASS: TestLoadRequest (0.00s)
> --- PASS: TestLoadRequest/Positive_Request (0.00s)
> --- PASS: TestLoadRequest/Negative_multi_item_test (0.00s)
> --- PASS: TestLoadRequest/Negative_no_request_test (0.00s)
> === RUN TestRsaWrapper_GenerateKey
> === RUN TestRsaWrapper_GenerateKey/Positive_test
> === RUN TestRsaWrapper_GenerateKey/Negative_test
> --- PASS: TestRsaWrapper_GenerateKey (0.00s)
> --- PASS: TestRsaWrapper_GenerateKey/Positive_test (0.00s)
> --- PASS: TestRsaWrapper_GenerateKey/Negative_test (0.00s)
> === RUN TestSaveToPEMFile
> === RUN TestSaveToPEMFile/Certificate
> === RUN TestSaveToPEMFile/Certificate_Request
> === RUN TestSaveToPEMFile/RSA_Private_Key
> === RUN TestSaveToPEMFile/Private_Key
> === RUN TestSaveToPEMFile/Public_Key
> === RUN TestSaveToPEMFile/Failed_to_encode
> === RUN TestSaveToPEMFile/Unknown_block_type
> --- PASS: TestSaveToPEMFile (0.00s)
> --- PASS: TestSaveToPEMFile/Certificate (0.00s)
> --- PASS: TestSaveToPEMFile/Certificate_Request (0.00s)
> --- PASS: TestSaveToPEMFile/RSA_Private_Key (0.00s)
> --- PASS: TestSaveToPEMFile/Private_Key (0.00s)
> --- PASS: TestSaveToPEMFile/Public_Key (0.00s)
> --- PASS: TestSaveToPEMFile/Failed_to_encode (0.00s)
> --- PASS: TestSaveToPEMFile/Unknown_block_type (0.00s)
> === RUN TestSignCertReq
> === RUN TestSignCertReq/Positive_test
> === RUN TestSignCertReq/Negative_test
> --- PASS: TestSignCertReq (0.03s)
> --- PASS: TestSignCertReq/Positive_test (0.02s)
> --- PASS: TestSignCertReq/Negative_test (0.01s)
> === RUN TestInitCA
> === RUN TestInitCA/Positive_test
> === RUN TestInitCA/Negative_test
> --- PASS: TestInitCA (42.66s)
> --- PASS: TestInitCA/Positive_test (42.66s)
> --- PASS: TestInitCA/Negative_test (0.00s)
> === RUN TestMakeReq
> === RUN TestMakeReq/Positive_test
> === RUN TestMakeReq/Negative_test
> --- PASS: TestMakeReq (0.01s)
> --- PASS: TestMakeReq/Positive_test (0.01s)
> --- PASS: TestMakeReq/Negative_test (0.00s)
> === RUN TestSignReq
> === RUN TestSignReq/Positive_test
> === RUN TestSignReq/Negative_test
> --- PASS: TestSignReq (0.01s)
> --- PASS: TestSignReq/Positive_test (0.01s)
> --- PASS: TestSignReq/Negative_test (0.00s)
> FAIL
> FAIL github.com/ansible/receptor/pkg/certificates 43.992s
> ? github.com/ansible/receptor/pkg/certificates/mock_certificates [no
> test files]
The full build log is available from:
http://qa-logs.debian.net/2025/02/15/receptor_1.5.2-1_unstable.log
All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20250215;users=lu...@debian.org
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20250215&fusertaguser=lu...@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results
A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!
If you reassign this bug to another package, please mark it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects
If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.
--- End Message ---
--- Begin Message ---
Source: receptor
Source-Version: 1.5.3-1
Done: Jérémy Lal <kapo...@melix.org>
We believe that the bug you reported is fixed in the latest version of
receptor, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1096...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Jérémy Lal <kapo...@melix.org> (supplier of updated receptor package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Wed, 19 Feb 2025 19:59:28 +0100
Source: receptor
Architecture: source
Version: 1.5.3-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Go Packaging Team <team+pkg...@tracker.debian.org>
Changed-By: Jérémy Lal <kapo...@melix.org>
Closes: 1096226
Changes:
receptor (1.5.3-1) unstable; urgency=medium
.
* New upstream version 1.5.3
* patch: revert pyroscope for now
* patch: drop a failing test caused by go 1.24 rsa change.
Closes: #1096226.
Checksums-Sha1:
b7555bfb87291cbb07a3315087903fa25e890a07 4049 receptor_1.5.3-1.dsc
26d540ebfd9e09a3e8fe800ed2eebc222685aa91 3788
receptor_1.5.3.orig-golang-github-jupp0r-go-priority-queue.tar.gz
24bafe78a6b39b1eca688042cfde08de00eb6071 2881
receptor_1.5.3.orig-golang-github-prep-socketpair.tar.gz
77c8e2fbce5dbc4dba14da619af3b57262021aa9 460843 receptor_1.5.3.orig.tar.gz
a0f5b60620849d7544a4b829e31ed12250616645 18056 receptor_1.5.3-1.debian.tar.xz
765242d79c0ece3db529b7578f0843fcdddd9b4e 16936
receptor_1.5.3-1_source.buildinfo
Checksums-Sha256:
5dbbe90d73106ce0220fd371fb8b6f33b64e37f2dbc61bc9a4d185b4bfd5f8e5 4049
receptor_1.5.3-1.dsc
7e37aef046ee521c7825666dd000563334684ddbf687b538ed6942e97783da19 3788
receptor_1.5.3.orig-golang-github-jupp0r-go-priority-queue.tar.gz
ec159019e245b59f27b4ce58b10c29ed453711312b6aedaf5310699825f7fe2a 2881
receptor_1.5.3.orig-golang-github-prep-socketpair.tar.gz
96618d4d4ed20133ad1e8e2d634124b144c4ce459f29ee9cf54871bd5482740f 460843
receptor_1.5.3.orig.tar.gz
159c752757fced69f53356cecc80113f451e8a47980b0a7102fb46f8c336998b 18056
receptor_1.5.3-1.debian.tar.xz
93fbd57fcef8ec16775ecea5c258b86739f22f9defbd7e41b1771da28573c516 16936
receptor_1.5.3-1_source.buildinfo
Files:
dd357d557c4fda6142551c986a088e09 4049 golang optional receptor_1.5.3-1.dsc
7b9aba0ec1db7224607a1afcdebfe395 3788 golang optional
receptor_1.5.3.orig-golang-github-jupp0r-go-priority-queue.tar.gz
d1af657620001d31e48785448e5a6425 2881 golang optional
receptor_1.5.3.orig-golang-github-prep-socketpair.tar.gz
f4469fc2e96f590bba500afde1f5ee0d 460843 golang optional
receptor_1.5.3.orig.tar.gz
e484af36f64f8d190c62330cdc674533 18056 golang optional
receptor_1.5.3-1.debian.tar.xz
a5eca085a4978aa60450972a83f0eb60 16936 golang optional
receptor_1.5.3-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=li+S
-----END PGP SIGNATURE-----
pgp6OLHPAWU2F.pgp
Description: PGP signature
--- End Message ---