Package: src:ostree Version: 2024.8-1 Severity: serious Tags: ftbfs
Dear maintainer: During a rebuild of all packages in unstable, your package failed to build: -------------------------------------------------------------------------------- [...] debian/rules binary dh binary dh_update_autotools_config debian/rules override_dh_autoreconf make[1]: Entering directory '/<<PKGBUILDDIR>>' mkdir -p debian/tmp-path env NOCONFIGURE=1 PATH=/<<PKGBUILDDIR>>/debian/tmp-path:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games dh_autoreconf ./autogen.sh autoreconf: export WARNINGS= autoreconf: Entering directory '.' autoreconf: configure.ac: not using Gettext autoreconf: running: aclocal --force -I buildutil -I libglnx ${ACLOCAL_FLAGS} autoreconf: configure.ac: tracing autoreconf: running: libtoolize --copy --force libtoolize: putting auxiliary files in AC_CONFIG_AUX_DIR, 'build-aux'. [... snipped ...] + '[' uid = fpr ']' + IFS=: + read -a fields + '[' sec = sec ']' + '[' -z A25C19F9E5613671 ']' + key2_id=4983E32424B34CD8 + IFS=: + read -a fields + '[' fpr = sec ']' + '[' fpr = ssb ']' + '[' fpr = fpr ']' + '[' -z AADA0A6CAD88352E79D0AEB2A25C19F9E5613671 ']' + '[' -z '' ']' + key2_fpr=E4570B6DEEDD21E65788BDCC4983E32424B34CD8 + IFS=: + read -a fields + '[' grp = sec ']' + '[' grp = ssb ']' + '[' grp = fpr ']' + IFS=: + read -a fields + '[' uid = sec ']' + '[' uid = ssb ']' + '[' uid = fpr ']' + IFS=: + read -a fields + '[' ssb = sec ']' + '[' ssb = ssb ']' + key2_sub_id=705CAEA31A31929A + IFS=: + read -a fields + '[' fpr = sec ']' + '[' fpr = ssb ']' + '[' fpr = fpr ']' + '[' -z AADA0A6CAD88352E79D0AEB2A25C19F9E5613671 ']' + '[' -z E4570B6DEEDD21E65788BDCC4983E32424B34CD8 ']' + key2_sub_fpr=63745F6A9210FC9765BF1B1F705CAEA31A31929A + IFS=: + read -a fields + '[' grp = sec ']' + '[' grp = ssb ']' + '[' grp = fpr ']' + IFS=: + read -a fields + ostree --repo=/var/tmp/tap-test.RUfrYl/repo commit -b test2 -s 'A GPG signed commit' -m 'Signed commit body' --tree=dir=files --gpg-homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --gpg-sign=A25C19F9E5613671 --gpg-sign=705CAEA31A31929A + ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2 + assert_file_has_content test2-show '^Found 2 signatures' + fpath=test2-show + shift + for re in "$@" + grep -q -e '^Found 2 signatures' test2-show + assert_file_has_content test2-show 'public key not found' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'public key not found' test2-show + assert_file_has_content test2-show A25C19F9E5613671 + fpath=test2-show + shift + for re in "$@" + grep -q -e A25C19F9E5613671 test2-show + assert_file_has_content test2-show 705CAEA31A31929A + fpath=test2-show + shift + for re in "$@" + grep -q -e 705CAEA31A31929A test2-show + echo 'ok signed with both generated keys' + gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --export A25C19F9E5613671 4983E32424B34CD8 + ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2 + assert_file_has_content test2-show '^Found 2 signatures' + fpath=test2-show + shift + for re in "$@" + grep -q -e '^Found 2 signatures' test2-show + assert_not_file_has_content test2-show 'public key not found' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'public key not found' test2-show + assert_file_has_content test2-show A25C19F9E5613671 + fpath=test2-show + shift + for re in "$@" + grep -q -e A25C19F9E5613671 test2-show + assert_file_has_content test2-show 705CAEA31A31929A + fpath=test2-show + shift + for re in "$@" + grep -q -e 705CAEA31A31929A test2-show + assert_file_has_content test2-show 'Good signature from "Test Key 1 <>"' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'Good signature from "Test Key 1 <>"' test2-show + assert_file_has_content test2-show 'Good signature from "Test Key 2 <>"' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'Good signature from "Test Key 2 <>"' test2-show + assert_file_has_content test2-show 'Primary key ID 4983E32424B34CD8' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'Primary key ID 4983E32424B34CD8' test2-show + echo 'ok verified both generated keys' + gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --quick-set-expire AADA0A6CAD88352E79D0AEB2A25C19F9E5613671 seconds=1 + sleep 2 + gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --export A25C19F9E5613671 4983E32424B34CD8 + ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2 + assert_file_has_content test2-show '^Found 2 signatures' + fpath=test2-show + shift + for re in "$@" + grep -q -e '^Found 2 signatures' test2-show + assert_not_file_has_content test2-show 'public key not found' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'public key not found' test2-show + assert_file_has_content test2-show A25C19F9E5613671 + fpath=test2-show + shift + for re in "$@" + grep -q -e A25C19F9E5613671 test2-show + assert_file_has_content test2-show 705CAEA31A31929A + fpath=test2-show + shift + for re in "$@" + grep -q -e 705CAEA31A31929A test2-show + assert_file_has_content test2-show 'BAD signature from "Test Key 1 <>"' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'BAD signature from "Test Key 1 <>"' test2-show + assert_file_has_content test2-show 'Key expired' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'Key expired' test2-show + assert_file_has_content test2-show 'Good signature from "Test Key 2 <>"' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'Good signature from "Test Key 2 <>"' test2-show + assert_file_has_content test2-show 'Primary key ID 4983E32424B34CD8' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'Primary key ID 4983E32424B34CD8' test2-show + echo 'ok verified with key1 expired' + gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --quick-set-expire AADA0A6CAD88352E79D0AEB2A25C19F9E5613671 seconds=0 + gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --quick-set-expire E4570B6DEEDD21E65788BDCC4983E32424B34CD8 seconds=1 + sleep 2 + gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --export A25C19F9E5613671 4983E32424B34CD8 + ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2 + assert_file_has_content test2-show '^Found 2 signatures' + fpath=test2-show + shift + for re in "$@" + grep -q -e '^Found 2 signatures' test2-show + assert_not_file_has_content test2-show 'public key not found' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'public key not found' test2-show + assert_file_has_content test2-show A25C19F9E5613671 + fpath=test2-show + shift + for re in "$@" + grep -q -e A25C19F9E5613671 test2-show + assert_file_has_content test2-show 705CAEA31A31929A + fpath=test2-show + shift + for re in "$@" + grep -q -e 705CAEA31A31929A test2-show + assert_file_has_content test2-show 'Good signature from "Test Key 1 <>"' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'Good signature from "Test Key 1 <>"' test2-show + assert_file_has_content test2-show 'BAD signature from "Test Key 2 <>"' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'BAD signature from "Test Key 2 <>"' test2-show + assert_file_has_content test2-show 'Primary key ID 4983E32424B34CD8' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'Primary key ID 4983E32424B34CD8' test2-show + assert_file_has_content test2-show 'Primary key expired' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'Primary key expired' test2-show + echo 'ok verified with key2 primary expired' + false + echo 'ok # SKIP gpg --quick-set-expire does not support expiring subkeys' + gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --quick-set-expire E4570B6DEEDD21E65788BDCC4983E32424B34CD8 seconds=0 + gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --export A25C19F9E5613671 4983E32424B34CD8 + false + echo 'ok # SKIP gpg --quick-set-expire does not support expiring subkeys' + gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --batch --passphrase '' --quick-add-key E4570B6DEEDD21E65788BDCC4983E32424B34CD8 rsa2048 sign never ++ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --list-secret-keys --with-colons gpg: checking the trustdb gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 2 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 2u + gpg_seckey_listing='sec:u:2048:1:A25C19F9E5613671:1730309711:::u:::scSC:::+:::23::0: fpr:::::::::AADA0A6CAD88352E79D0AEB2A25C19F9E5613671: grp:::::::::77D9998F239E0596CA32FA15F31CB1F7AC81CC78: uid:u::::1730309714::0987136B4D556952807B51F8BB0AAF7E845BCA85::Test Key 1::::::::::0: sec:u:2048:1:4983E32424B34CD8:1730309711:::u:::scSC:::+:::23::0: fpr:::::::::E4570B6DEEDD21E65788BDCC4983E32424B34CD8: grp:::::::::0ED4377F74BD3881385FB26A149838CC3008B1A2: uid:u::::1730309716::88A002D8DE3362C644091841F91A088A637827FE::Test Key 2::::::::::0: ssb:u:2048:1:705CAEA31A31929A:1730309711::::::s:::+:::23: fpr:::::::::63745F6A9210FC9765BF1B1F705CAEA31A31929A: grp:::::::::9678A9CC5C6700A2DB4331883B5BE96E21DBC50B: ssb:u:2048:1:C98EB3524FA3BC24:1730309716::::::s:::+:::23: fpr:::::::::7536E948EC58972D5B13C42CC98EB3524FA3BC24: grp:::::::::0690238CC4BB2B4F1051B60ED18923DCF74399E9:' ++ tail -n1 ++ awk -F: '{if ($1 == "ssb") print $5}' + key2_sub2_id=C98EB3524FA3BC24 ++ tail -n1 ++ awk -F: '{if ($1 == "fpr") print $10}' + key2_sub2_fpr=7536E948EC58972D5B13C42CC98EB3524FA3BC24 + ostree --repo=/var/tmp/tap-test.RUfrYl/repo commit -b test2 -s 'A GPG signed commit' -m 'Signed commit body' --tree=dir=files --gpg-homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --gpg-sign=A25C19F9E5613671 --gpg-sign=C98EB3524FA3BC24 + ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2 + assert_file_has_content test2-show '^Found 2 signatures' + fpath=test2-show + shift + for re in "$@" + grep -q -e '^Found 2 signatures' test2-show + assert_file_has_content test2-show A25C19F9E5613671 + fpath=test2-show + shift + for re in "$@" + grep -q -e A25C19F9E5613671 test2-show + assert_file_has_content test2-show C98EB3524FA3BC24 + fpath=test2-show + shift + for re in "$@" + grep -q -e C98EB3524FA3BC24 test2-show + assert_file_has_content test2-show 'Good signature from "Test Key 1 <>"' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'Good signature from "Test Key 1 <>"' test2-show + assert_file_has_content test2-show 'public key not found' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'public key not found' test2-show + echo 'ok verified with key2 sub2 missing' + key1_rev=/var/tmp/tap-test.RUfrYl/tmpgpghome/openpgp-revocs.d/AADA0A6CAD88352E79D0AEB2A25C19F9E5613671.rev + '[' -f /var/tmp/tap-test.RUfrYl/tmpgpghome/openpgp-revocs.d/AADA0A6CAD88352E79D0AEB2A25C19F9E5613671.rev ']' + sed -i '/BEGIN PGP PUBLIC KEY BLOCK/s/^://' /var/tmp/tap-test.RUfrYl/tmpgpghome/openpgp-revocs.d/AADA0A6CAD88352E79D0AEB2A25C19F9E5613671.rev + gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --import /var/tmp/tap-test.RUfrYl/tmpgpghome/openpgp-revocs.d/AADA0A6CAD88352E79D0AEB2A25C19F9E5613671.rev gpg: key A25C19F9E5613671: "Test Key 1" revocation certificate imported gpg: Total number processed: 1 gpg: new key revocations: 1 gpg: marginals needed: 3 completes needed: 1 trust model: pgp gpg: depth: 0 valid: 2 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 2u + gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --export A25C19F9E5613671 4983E32424B34CD8 + ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2 + assert_file_has_content test2-show '^Found 2 signatures' + fpath=test2-show + shift + for re in "$@" + grep -q -e '^Found 2 signatures' test2-show + assert_not_file_has_content test2-show 'public key not found' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'public key not found' test2-show + assert_file_has_content test2-show A25C19F9E5613671 + fpath=test2-show + shift + for re in "$@" + grep -q -e A25C19F9E5613671 test2-show + assert_file_has_content test2-show C98EB3524FA3BC24 + fpath=test2-show + shift + for re in "$@" + grep -q -e C98EB3524FA3BC24 test2-show + assert_file_has_content test2-show 'Key revoked' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'Key revoked' test2-show + assert_file_has_content test2-show 'Good signature from "Test Key 2 <>"' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'Good signature from "Test Key 2 <>"' test2-show + assert_file_has_content test2-show 'Primary key ID 4983E32424B34CD8' + fpath=test2-show + shift + for re in "$@" + grep -q -e 'Primary key ID 4983E32424B34CD8' test2-show + echo 'ok verified with key1 revoked' + run_exit_cmds + for expr in "${libtest_exit_cmds[@]}" + eval save_core ++ save_core ++ '[' -e core ']' + for expr in "${libtest_exit_cmds[@]}" + eval libtest_cleanup_gpg ++ libtest_cleanup_gpg ++ local gpg_homedir=/var/tmp/tap-test.RUfrYl/gpghome ++ gpg-connect-agent --homedir /var/tmp/tap-test.RUfrYl/gpghome killagent /bye + for expr in "${libtest_exit_cmds[@]}" + eval cleanup_tmpgpg_home ++ cleanup_tmpgpg_home ++ libtest_cleanup_gpg /var/tmp/tap-test.RUfrYl/tmpgpghome ++ local gpg_homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome ++ gpg-connect-agent --homedir /var/tmp/tap-test.RUfrYl/tmpgpghome killagent /bye Copying gpghome to /var/tmp/tap-test.RUfrYl checking for xattrs.../usr/bin/setfattr /var/tmp/tap-test.RUfrYl /var/tmp/tap-test.RUfrYl Unable to retrieve SELinux label, assuming disabled /var/tmp/tap-test.RUfrYl done checking for overlayfs whiteouts...done 1..9 e58b9c623799b28fde9bedc3e73628ba51ff73ade651e8bd270ef03d95715f12 08bf7d4b75b61a507b57db922191de303a5a3c8aa6806be3baf9c65cc3292331 fsck objects (1/23) 4% fsck objects (23/23) 100% object fsck of 2 commits completed successfully - no errors found. d505505b44ce9b66b7ff7bf5bdd08493aaaed087720a73e92cbba96ac16472a7 b9ff7e879fffb6e591fa3e49b0d863399ee969d3ee13b4af952569e249344384 14946aa17d545a0616549de698adc78a7ff7cd7791fcfded69e1ec9f33cc2a3a ok PASS: tests/test-gpg-signed-commit.sh 1 5cc11b25806d66ee3dd3a432908387b9512bf3c57a86958004cc45235859c817 ok signed with both generated keys PASS: tests/test-gpg-signed-commit.sh 2 signed with both generated keys ok verified both generated keys PASS: tests/test-gpg-signed-commit.sh 3 verified both generated keys ok verified with key1 expired PASS: tests/test-gpg-signed-commit.sh 4 verified with key1 expired ok verified with key2 primary expired PASS: tests/test-gpg-signed-commit.sh 5 verified with key2 primary expired ok # SKIP gpg --quick-set-expire does not support expiring subkeys SKIP: tests/test-gpg-signed-commit.sh 6 # SKIP gpg --quick-set-expire does not support expiring subkeys ok # SKIP gpg --quick-set-expire does not support expiring subkeys SKIP: tests/test-gpg-signed-commit.sh 7 # SKIP gpg --quick-set-expire does not support expiring subkeys a1da9987eaeb94ba2a317cd6b1539e40ff04a9a04d4b39e89042a6ae98effe3f ok verified with key2 sub2 missing PASS: tests/test-gpg-signed-commit.sh 8 verified with key2 sub2 missing ok verified with key1 revoked PASS: tests/test-gpg-signed-commit.sh 9 verified with key1 revoked OK closing connection OK closing connection SKIP: tests/test-rofiles-fuse.sh ================================ # testlabel.txt: security.selinux: No such attribute ++ BUILT_WITH_ASAN= ++ test -n '' ++ CMD_PREFIX= ++ test -n '' ++ test -z '' ++ OSTREE_HTTPD=/<<PKGBUILDDIR>>/ostree-trivial-httpd ++ '[' -x /<<PKGBUILDDIR>>/ostree-trivial-httpd ']' ++ _have_user_xattrs= ++ _have_systemd_and_libmount= ++ _have_strace_fault_injection= ++ libtest_exit_cmds+=(libtest_cleanup_gpg) ++ ED25519PUBLIC= ++ ED25519SEED= ++ ED25519SECRET= + skip_without_fuse + fusermount --version + grep -q 'Bounding set.*[^a-z]cap_sys_admin' + capsh --print /<<PKGBUILDDIR>>/tests/libtest.sh: line 692: capsh: command not found + skip 'No cap_sys_admin in bounding set, can'\''t use FUSE' + echo '1..0 # SKIP' 'No cap_sys_admin in bounding set, can'\''t use FUSE' + exit 0 + run_exit_cmds + for expr in "${libtest_exit_cmds[@]}" + eval save_core ++ save_core ++ '[' -e core ']' + for expr in "${libtest_exit_cmds[@]}" + eval libtest_cleanup_gpg ++ libtest_cleanup_gpg ++ local gpg_homedir=/var/tmp/tap-test.FPEM7a/gpghome ++ gpg-connect-agent --homedir /var/tmp/tap-test.FPEM7a/gpghome killagent /bye gpg-connect-agent: no running gpg-agent - starting '/usr/bin/gpg-agent' gpg-connect-agent: waiting for the agent to come up ... (5s) gpg-connect-agent: connection to agent established Copying gpghome to /var/tmp/tap-test.FPEM7a checking for xattrs.../usr/bin/setfattr /var/tmp/tap-test.FPEM7a /var/tmp/tap-test.FPEM7a Unable to retrieve SELinux label, assuming disabled /var/tmp/tap-test.FPEM7a done checking for overlayfs whiteouts...done 1..0 # SKIP No cap_sys_admin in bounding set, can't use FUSE SKIP: tests/test-rofiles-fuse.sh - No cap_sys_admin in bounding set, can't use FUSE OK closing connection SKIP: tests/coccinelle.sh ========================= # testlabel.txt: security.selinux: No such attribute ++ BUILT_WITH_ASAN= ++ test -n '' ++ CMD_PREFIX= ++ test -n '' ++ test -z '' ++ OSTREE_HTTPD=/<<PKGBUILDDIR>>/ostree-trivial-httpd ++ '[' -x /<<PKGBUILDDIR>>/ostree-trivial-httpd ']' ++ _have_user_xattrs= ++ _have_systemd_and_libmount= ++ _have_strace_fault_injection= ++ libtest_exit_cmds+=(libtest_cleanup_gpg) ++ ED25519PUBLIC= ++ ED25519SEED= ++ ED25519SECRET= + spatch --version + skip 'no spatch; get it from http://coccinelle.lip6.fr/' + echo '1..0 # SKIP' 'no spatch; get it from http://coccinelle.lip6.fr/' + exit 0 + run_exit_cmds + for expr in "${libtest_exit_cmds[@]}" + eval save_core ++ save_core ++ '[' -e core ']' + for expr in "${libtest_exit_cmds[@]}" + eval libtest_cleanup_gpg ++ libtest_cleanup_gpg ++ local gpg_homedir=/var/tmp/tap-test.dDVgxE/gpghome ++ gpg-connect-agent --homedir /var/tmp/tap-test.dDVgxE/gpghome killagent /bye gpg-connect-agent: no running gpg-agent - starting '/usr/bin/gpg-agent' gpg-connect-agent: waiting for the agent to come up ... (5s) gpg-connect-agent: connection to agent established Copying gpghome to /var/tmp/tap-test.dDVgxE checking for xattrs.../usr/bin/setfattr /var/tmp/tap-test.dDVgxE /var/tmp/tap-test.dDVgxE Unable to retrieve SELinux label, assuming disabled /var/tmp/tap-test.dDVgxE done checking for overlayfs whiteouts...done 1..0 # SKIP no spatch; get it from http://coccinelle.lip6.fr/ SKIP: tests/coccinelle.sh - no spatch; get it from http://coccinelle.lip6.fr/ OK closing connection ============================================================================ Testsuite summary for libostree 2024.8 ============================================================================ # TOTAL: 960 # PASS: 912 # SKIP: 46 # XFAIL: 0 # FAIL: 0 # XPASS: 0 # ERROR: 2 ============================================================================ See ./test-suite.log Please report to walt...@verbum.org ============================================================================ make[6]: *** [Makefile:8284: test-suite.log] Error 1 make[6]: Leaving directory '/<<PKGBUILDDIR>>' make[5]: *** [Makefile:8392: check-TESTS] Error 2 make[5]: Leaving directory '/<<PKGBUILDDIR>>' make[4]: *** [Makefile:9615: check-am] Error 2 make[4]: Leaving directory '/<<PKGBUILDDIR>>' make[3]: *** [Makefile:8169: check-recursive] Error 1 make[3]: Leaving directory '/<<PKGBUILDDIR>>' make[2]: *** [Makefile:9618: check] Error 2 make[2]: Leaving directory '/<<PKGBUILDDIR>>' make[1]: *** [debian/rules:64: override_dh_auto_test-arch] Error 1 make[1]: Leaving directory '/<<PKGBUILDDIR>>' make: *** [debian/rules:8: binary] Error 2 dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2 -------------------------------------------------------------------------------- The above is just how the build ends and not necessarily the most relevant part. If required, the full build log is available here: https://people.debian.org/~sanvila/build-logs/202410/ About the archive rebuild: The build was made on virtual machines from AWS, using sbuild and a reduced chroot with only build-essential packages. If you could not reproduce the bug please contact me privately, as I am willing to provide ssh access to a virtual machine where the bug is fully reproducible. If this is really a bug in one of the build-depends, please use reassign and affects, so that this is still visible in the BTS web page for this package. Thanks.