Source: monkeysphere Version: 0.38-1 Severity: serious Tags: stretch sid User: debian...@lists.debian.org Usertags: qa-ftbfs-20160828 qa-ftbfs Justification: FTBFS on amd64
Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part (hopefully): > make[1]: Entering directory '/<<PKGBUILDDIR>>' > MONKEYSPHERE_TEST_NO_EXAMINE=true ./tests/keytrans > ################################################## > ### generating openpgp key... > gpg: keybox '/<<PKGBUILDDIR>>/tests/tmp/ms.iTn/pubring.kbx' created > gpg: /<<PKGBUILDDIR>>/tests/tmp/ms.iTn/trustdb.gpg: trustdb created > gpg: key E986E81CA943A3B2 marked as ultimately trusted > gpg: directory '/<<PKGBUILDDIR>>/tests/tmp/ms.iTn/openpgp-revocs.d' created > gpg: revocation certificate stored as > '/<<PKGBUILDDIR>>/tests/tmp/ms.iTn/openpgp-revocs.d/7ED1F3C2EE6BAE213AF36D94E986E81CA943A3B2.rev' > gpg: done > ################################################## > ### retrieving key timestamp... > gpg: checking the trustdb > gpg: marginals needed: 3 completes needed: 1 trust model: pgp > gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u > ################################################## > ### exporting key to ssh file... > ################################################## > ### reconvert key, and compare to key in gpg keyring... > conversions look good! > Now working with key E986E81CA943A3B2 at time 1472342839 > gpg: marginals needed: 3 completes needed: 1 trust model: pgp > gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u > /<<PKGBUILDDIR>>/tests/tmp/ms.iTn/pubring.kbx > ------------------------------------------------------------------------- > pub rsa1024 2016-08-28 [SC] > 7ED1F3C2EE6BAE213AF36D94E986E81CA943A3B2 > uid [ultimate] testtest > > ################################################## > ### test User ID addition... > gpg: key E986E81CA943A3B2: "monkeymonkey" 1 new user ID > gpg: key E986E81CA943A3B2: "monkeymonkey" 1 new signature > gpg: Total number processed: 1 > gpg: new user IDs: 1 > gpg: new signatures: 1 > gpg: marginals needed: 3 completes needed: 1 trust model: pgp > gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u > /<<PKGBUILDDIR>>/tests/tmp/ms.iTn/pubring.kbx > ------------------------------------------------------------------------- > pub rsa1024 2016-08-28 [SC] > 7ED1F3C2EE6BAE213AF36D94E986E81CA943A3B2 > uid [ultimate] monkeymonkey > uid [ultimate] testtest > > ################################################## > ### sleeping to avoid test suite breakage on fast > ### processors (see http://bugs.debian.org/591118) > ################################################## > ### test User ID revocation ... > gpg: key E986E81CA943A3B2: "monkeymonkey" 1 new signature > gpg: Total number processed: 1 > gpg: new signatures: 1 > gpg: marginals needed: 3 completes needed: 1 trust model: pgp > gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u > /<<PKGBUILDDIR>>/tests/tmp/ms.iTn/pubring.kbx > ------------------------------------------------------------------------- > pub rsa1024 2016-08-28 [SC] > 7ED1F3C2EE6BAE213AF36D94E986E81CA943A3B2 > uid [ultimate] monkeymonkey > uid [ revoked] testtest > > ################################################## > ### test working with two primary keys ... > Generating public/private rsa key pair. > Your identification has been saved in > /<<PKGBUILDDIR>>/tests/tmp/ms.iTn/newkey. > Your public key has been saved in > /<<PKGBUILDDIR>>/tests/tmp/ms.iTn/newkey.pub. > The key fingerprint is: > SHA256:LoU6seNVsyWDU0ufKbKQxlvazuUcoVbaz9lg3aJnkHk user42@ip-172-31-14-246 > The key's randomart image is: > +---[RSA 1024]----+ > | | > | | > | o | > | . . = o o | > | * * S =o | > | . X % O+.E. | > | B O * ooo . | > | . B = = =o. | > | . o o =o. | > +----[SHA256]-----+ > gpg: key 7FE80A2A9912726D: public key "fubar" imported > gpg: key 7FE80A2A9912726D: secret key imported > gpg: Total number processed: 1 > gpg: imported: 1 > gpg: secret keys read: 1 > gpg: secret keys imported: 1 > gpg: key E986E81CA943A3B2: "monkeymonkey" 1 new user ID > gpg: key E986E81CA943A3B2: "monkeymonkey" 1 new signature > gpg: Total number processed: 1 > gpg: new user IDs: 1 > gpg: new signatures: 1 > test: diff expected gpg list output > test: diff expected keytrans listfpr output > ################################################## > Monkeysphere keytrans test completed successfully! > ################################################## > ### removing temp dir... > MONKEYSPHERE_TEST_NO_EXAMINE=true ./tests/basic > improper group writability on '/<<PKGBUILDDIR>>/tests/tmp' > > !!!WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING!!! > Permissions on testing directory '/<<PKGBUILDDIR>>/tests/tmp/ms.FKp' are > too loose to do proper strict permissions checking. Some tests > will be disabled or ignored. > > To avoid this warning (and to make sure that all tests are run > properly), please run these tests within a directory that meets > sshd's standards for "StrictModes yes" -- the directory (and every > one of its parents) should be owned only be the user running this > test or root, and should not be writable by group or other. > !!!WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING!!! > > > ################################################## > ### configuring testuser home... > 2 blocks > gpg: keybox '/<<PKGBUILDDIR>>/tests/tmp/ms.FKp/testuser/.gnupg/pubring.kbx' > created > gpg: /<<PKGBUILDDIR>>/tests/tmp/ms.FKp/testuser/.gnupg/trustdb.gpg: trustdb > created > gpg: key E00B5EEEBA79B482: public key "Monkeysphere Test Suite Test User (DO > NOT USE!!!) <testu...@example.net>" imported > gpg: key E00B5EEEBA79B482: secret key imported > gpg: Total number processed: 1 > gpg: imported: 1 > gpg: secret keys read: 1 > gpg: secret keys imported: 1 > gpg: no ultimately trusted keys found > gpg: key E00B5EEEBA79B482: "Monkeysphere Test Suite Test User (DO NOT USE!!!) > <testu...@example.net>" not changed > gpg: key 36FF78B37005D3BE: public key "Monkeysphere Test Suite Fake > Administrative User (DO NOT USE!!!) <fakead...@example.net>" imported > gpg: Total number processed: 2 > gpg: imported: 1 > gpg: unchanged: 1 > gpg: no ultimately trusted keys found > gpg: inserting ownertrust of 6 > gpg: inserting ownertrust of 5 > > ################################################## > ### configuring admin home... > gpg: keybox '/<<PKGBUILDDIR>>/tests/tmp/ms.FKp/admin/.gnupg/pubring.kbx' > created > gpg: /<<PKGBUILDDIR>>/tests/tmp/ms.FKp/admin/.gnupg/trustdb.gpg: trustdb > created > gpg: key 36FF78B37005D3BE: public key "Monkeysphere Test Suite Fake > Administrative User (DO NOT USE!!!) <fakead...@example.net>" imported > gpg: key 36FF78B37005D3BE: secret key imported > gpg: Total number processed: 1 > gpg: imported: 1 > gpg: secret keys read: 1 > gpg: secret keys imported: 1 > gpg: key 36FF78B37005D3BE: "Monkeysphere Test Suite Fake Administrative User > (DO NOT USE!!!) <fakead...@example.net>" not changed > gpg: Total number processed: 1 > gpg: unchanged: 1 > gpg: inserting ownertrust of 6 > > ################################################## > ### configuring sshd... > > ################################################## > ### import host key... > Generating public/private rsa key pair. > Your identification has been saved in > /<<PKGBUILDDIR>>/tests/tmp/ms.FKp/ssh_host_rsa_key. > Your public key has been saved in > /<<PKGBUILDDIR>>/tests/tmp/ms.FKp/ssh_host_rsa_key.pub. > The key fingerprint is: > SHA256:svkitQSb67ffkJ2Q5/h753tTWhRrf/BId9xoyL4QeBA user42@ip-172-31-14-246 > The key's randomart image is: > +---[RSA 1024]----+ > | E. | > | . . | > | o . . o+| > | . ..o o =o*| > | +. S..o o.*o| > | o o+ B... . *| > | +o.+ +. . oo| > | o +. + o o..| > | ..o.+o +o ooo.| > +----[SHA256]-----+ > using keyserver: example.org > ms: importing key from file > '/<<PKGBUILDDIR>>/tests/tmp/ms.FKp/ssh_host_rsa_key'... > ms: updating openpgp public key file > '/<<PKGBUILDDIR>>/tests/tmp/ms.FKp/host_keys.pub.pgp'... > ms: host key imported: > pub rsa1024 2016-08-28 [CA] > B2BBB58AC67742DA1F4A48BE90BFAA651F685577 > uid [ unknown] ssh://testhost.example > OpenPGP fingerprint: B2BBB58AC67742DA1F4A48BE90BFAA651F685577 > ssh fingerprint: 1024 SHA256:svkitQSb67ffkJ2Q5/h753tTWhRrf/BId9xoyL4QeBA (RSA) > > ################################################## > ### getting host key fingerprint... > using keyserver: example.org > ms: listing primary fingerprints from > /<<PKGBUILDDIR>>/tests/tmp/ms.FKp/host_keys.pub.pgp > ms: obtained the following fingerprints: > B2BBB58AC67742DA1F4A48BE90BFAA651F685577 > ms: publishing all keys > ms: using keys: B2BBB58AC67742DA1F4A48BE90BFAA651F685577 > ms: invoking show_key B2BBB58AC67742DA1F4A48BE90BFAA651F685577 > B2BBB58AC67742DA1F4A48BE90BFAA651F685577 > > ################################################## > ### setting host key expiration... > using keyserver: example.org > ms: extending without prompting. > ms: setting key expiration to 1. > ms: executing key expire script... > ms: updating openpgp public key file > '/<<PKGBUILDDIR>>/tests/tmp/ms.FKp/host_keys.pub.pgp'... > ms: Key B2BBB58AC67742DA1F4A48BE90BFAA651F685577 now expires at 2016-08-29 > 00:07:31 > ms: NOTE: Key expiration date adjusted, but not yet published. > ms: Run 'monkeysphere-host publish-key' to publish the new expiration date. > > ################################################## > ### certifying server host key... > gpg: key 90BFAA651F685577: public key "ssh://testhost.example" imported > gpg: Total number processed: 1 > gpg: imported: 1 > gpg: checking the trustdb > gpg: marginals needed: 3 completes needed: 1 trust model: pgp > gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u > > ################################################## > ### setup monkeysphere authentication... > ms: checking authentication directory structure... > ms: writing core gpg.conf... > ms: writing sphere gpg.conf... > ms: fixing sphere gnupg home ownership... > ms: determining core key fingerprint... > ms: core fingerprint: > ms: setting up Monkeysphere authentication trust core... > ms: generating monkeysphere authentication trust core key: > ms: size: 1024 bits > ms: uid: 'Monkeysphere authentication trust core UID (random string: > N61ivBG5zeuhr8PyZhNwVgzaolnY)' > ms: determining core key fingerprint... > ms: core fingerprint: 71BFE77BDA528129EA366B8076C65EC0EFC1E75B > ms: exporting core pub key to sphere keyring... > ms: setting ultimate owner trust on core key in gpg_sphere... > ms: gpg: inserting ownertrust of 6 > ms: # List of assigned trustvalues, created Sun Aug 28 00:07:33 2016 UTC > ms: # (Use "gpg --import-ownertrust" to restore them) > ms: 71BFE77BDA528129EA366B8076C65EC0EFC1E75B:6: > ms: checking gpg_sphere owner trust set properly... > ms: checking trust model for authentication ... > ms: sphere trust model: 1:3:1 > > ################################################## > ### adding admin as certifier... > ms: checking authentication directory structure... > ms: writing core gpg.conf... > ms: writing sphere gpg.conf... > ms: fixing sphere gnupg home ownership... > ms: determining core key fingerprint... > ms: core fingerprint: 71BFE77BDA528129EA366B8076C65EC0EFC1E75B > ms: Monkeysphere authentication trust core already exists. > ms: exporting core pub key to sphere keyring... > ms: setting ultimate owner trust on core key in gpg_sphere... > ms: # List of assigned trustvalues, created Sun Aug 28 00:07:33 2016 UTC > ms: # (Use "gpg --import-ownertrust" to restore them) > ms: 71BFE77BDA528129EA366B8076C65EC0EFC1E75B:6: > ms: checking gpg_sphere owner trust set properly... > ms: checking trust model for authentication ... > ms: sphere trust model: 1:3:1 > ms: reading key from stdin... > ms: checking keys in file... > ms: loading key into core keyring... > ms: executing core ltsign script... > ms: exporting core local sigs to sphere... > ms: updating sphere trustdb... > ms: Identity certifier added. > > ################################################## > ### list certifiers... > ms: checking authentication directory structure... > ms: writing core gpg.conf... > ms: writing sphere gpg.conf... > ms: fixing sphere gnupg home ownership... > ms: determining core key fingerprint... > ms: core fingerprint: 71BFE77BDA528129EA366B8076C65EC0EFC1E75B > ms: Monkeysphere authentication trust core already exists. > ms: exporting core pub key to sphere keyring... > ms: setting ultimate owner trust on core key in gpg_sphere... > ms: # List of assigned trustvalues, created Sun Aug 28 00:07:34 2016 UTC > ms: # (Use "gpg --import-ownertrust" to restore them) > ms: 71BFE77BDA528129EA366B8076C65EC0EFC1E75B:6: > ms: checking gpg_sphere owner trust set properly... > ms: checking trust model for authentication ... > ms: sphere trust model: 1:3:1 > ms: finding trusted keys... > ms: determining core key fingerprint... > 4275279C9512E14BDD14098A36FF78B37005D3BE: > :Monkeysphere Test Suite Fake Administrative User (DO NOT USE!!!) > <fakead...@example.net>:1:120: > > ################################################## > ### generating key for testuser... > ms: creating password fifo... > ms: Prompting for passphrase > ms: Launching "/<<PKGBUILDDIR>>/tests/tmp/ms.FKp/testuser/.ssh/askpass" > ms: (with prompt "Please enter your passphrase for E00B5EEEBA79B482: ") > ms: Generating subkey. This may take a long time... > ms: done. > > ################################################## > ### export server key to testuser... > gpg: key 90BFAA651F685577: public key "ssh://testhost.example" imported > gpg: Total number processed: 1 > gpg: imported: 1 > gpg: marginals needed: 3 completes needed: 1 trust model: pgp > gpg: depth: 0 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 1u > gpg: depth: 1 valid: 1 signed: 1 trust: 0-, 0q, 0n, 0m, 1f, 0u > gpg: depth: 2 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u > gpg: next trustdb check due at 2016-08-29 > > ################################################## > ### export testuser key to server... > ms: checking authentication directory structure... > ms: writing core gpg.conf... > ms: writing sphere gpg.conf... > ms: fixing sphere gnupg home ownership... > ms: determining core key fingerprint... > ms: core fingerprint: 71BFE77BDA528129EA366B8076C65EC0EFC1E75B > ms: Monkeysphere authentication trust core already exists. > ms: exporting core pub key to sphere keyring... > ms: setting ultimate owner trust on core key in gpg_sphere... > ms: # List of assigned trustvalues, created Sun Aug 28 00:24:23 2016 UTC > ms: # (Use "gpg --import-ownertrust" to restore them) > ms: 71BFE77BDA528129EA366B8076C65EC0EFC1E75B:6: > ms: checking gpg_sphere owner trust set properly... > ms: checking trust model for authentication ... > ms: sphere trust model: 1:3:1 > > ################################################## > ### update server authorized_keys file for this testuser... > ms: checking authentication directory structure... > ms: writing core gpg.conf... > ms: writing sphere gpg.conf... > ms: fixing sphere gnupg home ownership... > ms: determining core key fingerprint... > ms: core fingerprint: 71BFE77BDA528129EA366B8076C65EC0EFC1E75B > ms: Monkeysphere authentication trust core already exists. > ms: exporting core pub key to sphere keyring... > ms: setting ultimate owner trust on core key in gpg_sphere... > ms: # List of assigned trustvalues, created Sun Aug 28 00:24:23 2016 UTC > ms: # (Use "gpg --import-ownertrust" to restore them) > ms: 71BFE77BDA528129EA366B8076C65EC0EFC1E75B:6: > ms: checking gpg_sphere owner trust set properly... > ms: checking trust model for authentication ... > ms: sphere trust model: 1:3:1 > ms: ----- user: user42 ----- > ms: checking for authorized_user_ids... > ms: skipping path permission check for > '/<<PKGBUILDDIR>>/tests/tmp/ms.FKp/testuser/.monkeysphere/authorized_user_ids' > because STRICT_MODES is false... > ms: processing authorized_user_ids... > ms: processing: Monkeysphere Test Suite Test User (DO NOT USE!!!) > <testu...@example.net> > ms: key file: - > ms: primary key found: E00B5EEEBA79B482 > ms: - unacceptable primary key. > ms: * acceptable sub key. > ms: key line: ssh-rsa > AAAAB3NzaC1yc2EAAAADAQABAAABAQDKtYc6vf1KV8jx2HTCrxZsVkaPfvEyABCt3/lJP+31wgi1LBdNO+2RVUzSpXy+3D58qtI9Xy44ln+/Wkjh/TnBp4k/3N4fYiCRO4lDfvdhDP6BwxjaQNhUvSm/a1/oni9UA6ezZewgWbDdD+GbgGEbHPtuzpWLATQ13zBCMMcXUJ8rVeZWOt2NaxaLbliZ2uLTKGIteoj2MQL6PP3Y+BRXnd1kdOnmL7wsJdRnPj/mZ+AeMz/nC/Ai2rPjce8V4N73mjKDbcSlGZY3fcOK+m0U1N7VXphYsnL3ihKVcxh9LoLY9CJjHmpLYCf5GCP/BixqwCqPV83XtIghrZdJ0Zoh > MonkeySphere2016-08-28T00:24:23 Monkeysphere Test Suite Test User (DO NOT > USE!!!) <testu...@example.net> > ms: KEYS_PROCESSED=2 > ms: KEYS_VALID=1 > ms: moving new file to > /<<PKGBUILDDIR>>/tests/tmp/ms.FKp/authorized_keys/user42... > > ################################################## > ### testing monkeysphere keys-for-userid ... > ms: processing: ssh://testhost.example > ms: key file: - > ms: primary key found: 90BFAA651F685577 > ms: * acceptable primary key. > ms: key line: ssh-rsa > AAAAB3NzaC1yc2EAAAADAQABAAAAgQDNgPU2K0cna0M95eBRIoITL43JSEvhVdGA9Pk/xbvTezddIupehtbywOweuYGWe9eNV1M7w9bALhCkTpA+JQrnxxSaNSGbAvMKCZfYtJKe5H4np0dWZGRu+30w5qFJWWNk8qsqn5Zmj7hiK2Avt4tGfXjybU6zAWzSQcDUWrO3Sw== > ms: KEYS_PROCESSED=1 > ms: KEYS_VALID=1 > > ################################################## > ### ssh connection test for success... > ##### starting ssh server... > ##### starting ssh client... > /<<PKGBUILDDIR>>/tests/../src/share/m/subkey_to_ssh_agent: line 123: > agent-transfer: command not found > ##### ssh connection test FAILED. returned: 127, expected: 0 > FAILED! > ### removing temp dir... > Makefile:114: recipe for target 'test-basic' failed > make[1]: *** [test-basic] Error 1 > make[1]: Leaving directory '/<<PKGBUILDDIR>>' > dh_auto_test: make -j1 test returned exit code 2 The full build log is available from: http://people.debian.org/~lucas/logs/2016/08/28/monkeysphere_0.38-1_unstable.log A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! About the archive rebuild: The rebuild was done on EC2 VM instances from Amazon Web Services, using a clean, minimal and up-to-date chroot. Every failed build was retried once to eliminate random failures.