Your message dated Wed, 04 Jun 2025 09:04:09 +0000
with message-id <e1umk2b-003uxp...@fasolo.debian.org>
and subject line Bug#1106397: fixed in debvm 0.4.4
has caused the Debian Bug report #1106397,
regarding debvm: flaky autopkgtest: exp3 not open
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1106397: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106397
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: debvm
Version: 0.4.1
Severity: serious
User: debian...@lists.debian.org
Usertags: flaky

Dear maintainer(s),

I looked at the results of the autopkgtest of your package because it was showing up in the excuses for dpkg. I noticed that it regularly fails on amd64. Maybe you need to wait longer before deciding that starting the VM failed?

Because the unstable-to-testing migration software now blocks on
regressions in testing, flaky tests, i.e. tests that flip between
passing and failing without changes to the list of installed packages,
are causing people unrelated to your package to spend time on these
tests.

Don't hesitate to reach out if you need help and some more information
from our infrastructure.

Paul

https://ci.debian.net/packages/d/debvm/testing/amd64/60842802/

369s send: spawn id exp3 not open
369s     while executing
369s "send "echo 6coF0JBW\$((2+3))\r""
369s     (file "./tests/shell_interaction.expect" line 7)
369s + cleanup
369s + rm -f ssh_id ssh_id.pub test.img
370s autopkgtest [04:17:32]: test debefivm-root: -----------------------]

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature


--- End Message ---
--- Begin Message ---
Source: debvm
Source-Version: 0.4.4
Done: Helmut Grohne <hel...@subdivi.de>

We believe that the bug you reported is fixed in the latest version of
debvm, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1106...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Helmut Grohne <hel...@subdivi.de> (supplier of updated debvm package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 04 Jun 2025 10:20:14 +0200
Source: debvm
Architecture: source
Version: 0.4.4
Distribution: unstable
Urgency: medium
Maintainer: Helmut Grohne <hel...@subdivi.de>
Changed-By: Helmut Grohne <hel...@subdivi.de>
Closes: 1106397
Changes:
 debvm (0.4.4) unstable; urgency=medium
 .
   * Force tests to not use smp (Closes: #1106397)
Checksums-Sha1:
 130f5702c0da01a84b0ec7493e700a31d7982560 2086 debvm_0.4.4.dsc
 2ccdb55a11b677cfafd9b83bf0243d1f60459b1f 28832 debvm_0.4.4.tar.xz
Checksums-Sha256:
 c2ab97c93694eda96294111fe7e536c322561f692eaefb5f6f8d32b2ab0131ed 2086 
debvm_0.4.4.dsc
 0274a3ea795244d4651753ec4babe37c40f21aa71617e6524cb7bb2b9127df58 28832 
debvm_0.4.4.tar.xz
Files:
 2c0baf1d5b4ef56a60be39fdee7ce271 2086 admin optional debvm_0.4.4.dsc
 18de40fe092736c6ae14547c4ec78942 28832 admin optional debvm_0.4.4.tar.xz

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEETMLS2QqNFlTb+HOqLRqqzyREREIFAmhAAo8ACgkQLRqqzyRE
REK6TA/+I5BaQQTMH3SepVkwBl5Y61OZBEnrvwnqAF9ayNl1GGrAUJkmzsS0A1Km
wZSUJGswQI1ndeHEjhtbDbOnWJMkIVzQmY7RFkkK8rVTgoS7cp5VYk8cEi3i1MZV
32/AgH2P41YoC5N5yDi4T0tTpViONjaoAXiOBMp4X7bLnM/c8YY/kzN/8pIl5GR9
k+Kh+JdMWrb8Mvz6/6pMLuUL/M2rnb3rXR2vRY1etMwEKmTdEeC7C93/IQAPTFUt
cEGj1qKRvu7cLNsmXw1CJPMwWY89rmPH9aCj5gzFYxP2neQqe0LKy98bOKWST0a1
hoasoOgubmqVBl+gWCCS+QohwZc1bmy9uZjU0A1bHnWbayrgDPgEMpTyla8XAc9U
zXkDCJP5QM7edArdhgOybxuV2LeTTW1AsUiq8W40hatZLfxKuvxOPo4D4awROaim
tDpMqMffSdduHauKPE15tH6KRGpO9kM5NlEZ/WVZo5PkzDtraxfExHXxjy9T5cW0
jzgn4s8D0lrMCqWNafMVai/5QZXclq5YCKlDXZrrF1659HL/8cr9RBoACruRnHEH
fVPR93JS7PK+QwP0GAqpqiXyNzmZw6HndIJIVPjM1IneEFoLTHdJ05SqsASfcf/7
+wK87CFdFzAW3N9W2naBC+zG5EiaUEaLoOfUqFeOhUGsvP+XGzs=
=JeHS
-----END PGP SIGNATURE-----

Attachment: pgpJNUE_O7bBg.pgp
Description: PGP signature


--- End Message ---

Reply via email to