Your message dated Fri, 11 Feb 2022 08:34:02 +0000
with message-id <e1nirns-000fmn...@fasolo.debian.org>
and subject line Bug#1001476: fixed in sssd 2.6.3-1
has caused the Debian Bug report #1001476,
regarding sssd: openssl conf incompatible with openssl 3.0
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1001476: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1001476
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: sssd
Version: 2.6.1-1
Severity: important
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu jammy ubuntu-patch

Dear maintainers,

Ubuntu has transitioned to OpenSSL 3, which has revealed an incompatibility
between OpenSSL 3.0 and one of the sssd autopkgtests due to use of an
invalid 'RANDFILE' setting:

[...]
Cannot write random bytes:
40E74CDBE07F0000:error:1200007A:random number generator:RAND_write_file:Not a 
regular file:../crypto/rand/randfile.c:190:Filename=/dev/urandom
[...]

  
(https://autopkgtest.ubuntu.com/results/autopkgtest-jammy/jammy/amd64/s/sssd/20211123_115512_c7315@/log.gz)

The attached patch addresses this, and lets the tests pass with OpenSSL 3,
which is currently in Debian experimental.

Cheers,
-- 
Steve Langasek                   Give me a lever long enough and a Free OS
Debian Developer                   to set it on, and I can move the world.
Ubuntu Developer                                   https://www.debian.org/
slanga...@ubuntu.com                                     vor...@debian.org
diff -Nru sssd-2.6.1/debian/tests/util sssd-2.6.1/debian/tests/util
--- sssd-2.6.1/debian/tests/util        2021-11-12 03:31:25.000000000 -0800
+++ sssd-2.6.1/debian/tests/util        2021-12-09 03:14:56.000000000 -0800
@@ -41,7 +41,6 @@
     local cnf="/etc/ldap/openssl.cnf"
 
     cat > "$cnf" <<EOF
-RANDFILE                = /dev/urandom
 [ req ]
 default_bits            = 1024
 default_keyfile         = privkey.pem

--- End Message ---
--- Begin Message ---
Source: sssd
Source-Version: 2.6.3-1
Done: Timo Aaltonen <tjaal...@debian.org>

We believe that the bug you reported is fixed in the latest version of
sssd, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1001...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Timo Aaltonen <tjaal...@debian.org> (supplier of updated sssd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 11 Feb 2022 09:35:43 +0200
Source: sssd
Built-For-Profiles: noudeb
Architecture: source
Version: 2.6.3-1
Distribution: unstable
Urgency: medium
Maintainer: Debian SSSD Team <pkg-sssd-de...@alioth-lists.debian.net>
Changed-By: Timo Aaltonen <tjaal...@debian.org>
Closes: 999951 1001476
Changes:
 sssd (2.6.3-1) unstable; urgency=medium
 .
   * New upstream release.
   * control: Migrate to PCRE2. (Closes: #999951)
   * Update signing-key.asc.
   * control: Drop python3-click from sssd-tools depends.
   * sssd-tools.install: Updated.
   * tests: Drop RANDFILE from tests/util. (Closes: #1001476)
Checksums-Sha1:
 2ea0c3b4b5c9717328eabcd87fab74565f4a9fed 4974 sssd_2.6.3-1.dsc
 f226c2d9259a82d87ba67d85288d33c5852a9436 7510020 sssd_2.6.3.orig.tar.gz
 93a6a87a1aaff33d5c13944cfd027a1fbff8912b 488 sssd_2.6.3.orig.tar.gz.asc
 0f5431d6423b9c40e543aa696dab3e8f03c50894 36584 sssd_2.6.3-1.debian.tar.xz
 51a58d91a323455a70b1be116d4a425cedb6c9be 8262 sssd_2.6.3-1_source.buildinfo
Checksums-Sha256:
 192b8e09997247491587890b6c90bc9f8d02c8f406feac5f6fc2b185c2441ee4 4974 
sssd_2.6.3-1.dsc
 3dd820b3da90cddbcb1041ef3c16102d78aad9d8c9ab25630e0c14a2f8992b18 7510020 
sssd_2.6.3.orig.tar.gz
 4ea58e7d1853d6928d69c21dabda30a96346a79902be3325d4a458185a9a4f20 488 
sssd_2.6.3.orig.tar.gz.asc
 11a241d8b78c6741eab07002cec745d7079e7986219214f55d0d81d3a1a5cce4 36584 
sssd_2.6.3-1.debian.tar.xz
 3943f69f5fba06660ffe0ea2845eaaaef28691243bba0127ced6b5a1889f1dd7 8262 
sssd_2.6.3-1_source.buildinfo
Files:
 e2ea64149b4b0e50ad8526f6c3af3fca 4974 utils optional sssd_2.6.3-1.dsc
 068a9258039dd72a793e9ff7d551e451 7510020 utils optional sssd_2.6.3.orig.tar.gz
 91bc8fc377e3b55b45bd1f4a2e1d553b 488 utils optional sssd_2.6.3.orig.tar.gz.asc
 35c7d3179d9acc01c7366fe05075db27 36584 utils optional 
sssd_2.6.3-1.debian.tar.xz
 a64f5d6886739f5f37aa51cededccc30 8262 utils optional 
sssd_2.6.3-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEdS3ifE3rFwGbS2Yjy3AxZaiJhNwFAmIGEfAACgkQy3AxZaiJ
hNxSqQ//TFxX5Y2xh+F9BddBhotKXPWs++oQHir8yMkcRwFwnMlv4PiVv8KOiGjh
WTD/X1+DDlwktZip2zon8wEVhegm5LA3jqlLQ/L0FXzbBz7MZHjpgOZEpCSRIO7o
GqqCMGw1KxMKEH/Nb1j3rlrTpu+SbH4rlN+yZzE6KrUJqj9szH44TBKopbQIU7K4
++qF5ok4IS8AZPjz1ekRs7XaKsXkaI6ADBJSTDHg3n39hcxO0G/cSLn5WiNiZVc9
biZ/3HKKTHW/5KVm1d4P8RThOE1z4iBV/fBKtxPxvPq4rDfq42gmK8OBYFhQDQCl
JYnhviUFAXbADGYadwfPQ/l3VQeEIa95B1nu8c8XvdMYYUbzd+rQgnKHqMtjqWF4
EQm8NjbDi+VbaPGLczx0LLxI8LPjfuMR5dKemdcKgWRxEExjeOndwLqRQe6CwTkn
EUVeL+7E/6EsJB/5/8QCdmfz+/e4g84pCjizmRNvgVzBcW3eMtzWPc1Vhty55iXF
Uojcm2BvlN+symeho04H7I6+HUX7IyuVg59x4bCGsMDH/DZZBNddup2DZZmigg0F
39dJ9z+VKzoomMr/ItL25OZUw6DjbQoUMy89JMMZPxmSiJGgkxiPBJpgrPDnETOI
yO4dHi2fnrvRk+1pfTtVXgxhMI/6iLUIq70jTTv4PshKdS21NnM=
=Y2BR
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to