Your message dated Mon, 30 Jul 2018 11:21:02 +0900
with message-id 
and subject line Re: Bug#904731: fakeupstream.cgi: 
fakeupstream.cgi?upstream=sf/*
has caused the Debian Bug report #904731,
regarding fakeupstream.cgi: fakeupstream.cgi?upstream=sf/* returns empty results
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
904731: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904731
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: qa.debian.org
Severity: normal

Dear Maintainer,

* What led up to the situation?

It seems that fakeupstream.cgi returns empty response if upstream=sf/* is 
specified.

* What exactly did you do (or not do) that was effective (or
  ineffective)?

I've noticed that accessing the following url by browser.

  https://qa.debian.org/cgi-bin/fakeupstream.cgi?upstream=sf/apertium/giella-sme

Also checked via curl:

LANG=C curl -v 
https://qa.debian.org/cgi-bin/fakeupstream.cgi?upstream=sf/apertium/giella-sme
*   Trying 2001:41c8:1000:21::21:28...
* TCP_NODELAY set
* connect to 2001:41c8:1000:21::21:28 port 443 failed: Connection refused
*   Trying 5.153.231.28...
* TCP_NODELAY set
* Connected to qa.debian.org (5.153.231.28) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
*   CAfile: /etc/ssl/certs/ca-certificates.crt
  CApath: /etc/ssl/certs
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
*  subject: CN=qa.debian.org
*  start date: Jun  8 00:32:46 2018 GMT
*  expire date: Sep  6 00:32:46 2018 GMT
*  subjectAltName: host "qa.debian.org" matched cert's "qa.debian.org"
*  issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
*  SSL certificate verify ok.
> GET /cgi-bin/fakeupstream.cgi?upstream=sf/apertium/giella-sme HTTP/1.1
> Host: qa.debian.org
> User-Agent: curl/7.60.0
> Accept: */*
> 
< HTTP/1.1 200 OK
< Date: Fri, 27 Jul 2018 09:17:12 GMT
< Server: Apache
< X-Content-Type-Options: nosniff
< X-Frame-Options: sameorigin
< Referrer-Policy: no-referrer
< X-Xss-Protection: 1
< Strict-Transport-Security: max-age=15552000
< Public-Key-Pins: pin-sha256="FucbwYIiPXFJ5+ftcgqknth2/JalZeR6eAg+6eGlmvE="; 
pin-sha256="I2RM2I85Fmn1oaLG2PAmqJSzUTCyJRaom+T+8wX+jqA="; max-age=5184000
< Vary: Accept-Encoding
< X-Clacks-Overhead: GNU Terry Pratchett
< Transfer-Encoding: chunked
< Content-Type: text/html; charset=ISO-8859-1
< 
<!DOCTYPE html
        PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
         "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd";>
<html xmlns="http://www.w3.org/1999/xhtml"; lang="en-US" xml:lang="en-US">
<head>
<title>Untitled Document</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
</head>
<body>
<ul></ul>
</body>
* Connection #0 to host qa.debian.org left intact
</html>

It returns empty list.

* What was the outcome of this action?

List of upstream versions

* What outcome did you expect instead?

No upstream versions

-- System Information:
Debian Release: buster/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.17.0-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=ja_JP.utf8, LC_CTYPE=ja_JP.utf8 (charmap=UTF-8), 
LANGUAGE=ja_JP.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Attachment: pgpedCE8I1EkF.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
 returns empty results
Message-Id: <20180730112102.0cea7f214e86d3077d429...@clear-code.com>
In-Reply-To: 
<caktje6gt9rtk_odo3pqw-ggrorub3hpklxg1ggai98jb-yt...@mail.gmail.com>
X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.32; x86_64-unknown-linux-gnu)
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

On Sun, 29 Jul 2018 22:29:00 +0800 Paul Wise <p...@debian.org> wrote:
> On Sun, Jul 29, 2018 at 8:37 PM, Kentaro Hayashi wrote:
> 
> > Thanks.
> 
> Please close the bug if you successfully switch to the other SF redirector.

Done.

> > By the way, is these server side redirector implemented by what package or 
> > repository?
> 
> https://salsa.debian.org/qa/qa/blob/master/cgi-bin/fakeupstream.cgi
> https://salsa.debian.org/qa/qa/blob/master/wml/watch/sf.wml

Thanks!
I didn't know sf.wml at all. I'll check it later.

Regards,

--- End Message ---

Reply via email to