Package: release.debian.org Severity: normal Tags: stretch User: release.debian....@packages.debian.org Usertags: pu
Could 0.18.2-6+deb9u1 be included in stretch's next point release ? It closes #934033, which is an FTBFS on stretch, by blacklisting a couple #more things from the test suite. Here's the corresponding debdiff: diff --git a/debian/changelog b/debian/changelog index 53e5f5e0..4fcb7218 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,10 @@ +mitmproxy (0.18.2-6+deb9u1) stretch; urgency=medium + + * Blacklist tests that require internet access (Closes: #934033) + * Add d/gbp.conf + + -- Sebastien Delafond <s...@debian.org> Thu, 08 Aug 2019 10:59:45 +0200 + mitmproxy (0.18.2-6) unstable; urgency=medium * Remove upper-bounds on all versioned dependencies (Closes: #848562) diff --git a/debian/gbp.conf b/debian/gbp.conf new file mode 100644 index 00000000..cf311b7f --- /dev/null +++ b/debian/gbp.conf @@ -0,0 +1,3 @@ +[DEFAULT] +debian-branch = debian/stretch +upstream-branch = upstream/latest diff --git a/debian/rules b/debian/rules index 52e363b9..ef374ed1 100755 --- a/debian/rules +++ b/debian/rules @@ -1,7 +1,7 @@ #!/usr/bin/make -f export PYBUILD_NAME=mitmproxy -export PYBUILD_TEST_ARGS="-k-TestServerIPv6 -k-TestServerCurrentCipher -k-TestServerCipherList" +export PYBUILD_TEST_ARGS="-k-TestServerIPv6 -k-TestServerCurrentCipher -k-TestServerCipherList -k-TestSSLUpstreamCertVerificationWValidCertChain -k-TestHTTPSUpstreamServerVerificationWTrustedCert" MAN_PAGES := $(shell cat debian/mitmproxy.manpages) Cheers, -- Seb -- System Information: Debian Release: buster/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'oldstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.19.0-3-amd64 (SMP w/36 CPU cores) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_DIE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled