Source: openssl-blacklist Version: 0.5-2 Severity: serious Tags: wheezy sid User: debian...@lists.debian.org Usertags: qa-ftbfs-20110528 qa-ftbfs Justification: FTBFS on amd64
Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part: > /usr/bin/fakeroot debian/rules clean > dh_testdir > dh_testroot > rm -f build-stamp configure-stamp > # Add here commands to clean up after the build process. > dh_clean > dpkg-source -b openssl-blacklist-0.5 > dpkg-source: warning: no source format specified in debian/source/format, see > dpkg-source(1) > dpkg-source: info: using source format `1.0' > dpkg-source: info: building openssl-blacklist using existing > openssl-blacklist_0.5.orig.tar.gz > dpkg-source: info: building openssl-blacklist in > openssl-blacklist_0.5-2.diff.gz > dpkg-source: warning: the diff modifies the following upstream files: > examples/bad_req.csr > examples/bad_rsa.key > examples/bad_rsa_4096.pem > examples/bad_rsa_password_is_pass.key > examples/bad_x509.pem > examples/bad_x509_4096.pem > examples/gen_certs.sh > examples/getpid.c > examples/good_req.csr > examples/good_rsa.key > examples/good_x509.pem > openssl-vulnkey > openssl-vulnkey.1 > test.sh > dpkg-source: info: use the '3.0 (quilt)' format to have separate and > documented changes to upstream files, see dpkg-source(1) > dpkg-source: info: building openssl-blacklist in openssl-blacklist_0.5-2.dsc > debian/rules build > dh_testdir > # Add here commands to configure the package. > touch configure-stamp > dh_testdir > # Add here commands to compile the package. > sh ./test.sh > no args: PASS > no modulus: PASS > no bits: PASS > > bad_req.csr: > Skipped: 'examples/bad_req.csr' has unsupported bit size > FAIL > > bad_req.csr (stdin): > Skipped: '-' has unsupported bit size > FAIL > > bad_x509.pem: > Skipped: 'examples/bad_x509.pem' has unsupported bit size > FAIL > > bad_x509.pem (stdin): > Skipped: '-' has unsupported bit size > FAIL > > bad_rsa.key: > COMPROMISED: 58dce70acfd4dc1a9d28722fc62edb8d30110778 examples/bad_rsa.key > PASS > > bad_rsa.key (stdin): > COMPROMISED: 58dce70acfd4dc1a9d28722fc62edb8d30110778 - > PASS > > bad_rsa_4096.pem: > COMPROMISED: 35f8546394046fea00ad767812827a90debb78b5 > examples/bad_rsa_4096.pem > PASS > > bad_rsa_4096.pem (stdin): > COMPROMISED: 35f8546394046fea00ad767812827a90debb78b5 - > PASS > > bad_x509_4096.pem: > Skipped: 'examples/bad_x509_4096.pem' has unsupported bit size > FAIL > > bad_x509_4096.pem (stdin): > Skipped: '-' has unsupported bit size > FAIL > > all bad files (examples/bad_req.csr examples/bad_x509.pem > examples/bad_rsa.key examples/bad_rsa_4096.pem examples/bad_x509_4096.pem): > Skipped: 'examples/bad_req.csr' has unsupported bit size > Skipped: 'examples/bad_x509.pem' has unsupported bit size > Skipped: 'examples/bad_x509_4096.pem' has unsupported bit size > COMPROMISED: 58dce70acfd4dc1a9d28722fc62edb8d30110778 examples/bad_rsa.key > COMPROMISED: 35f8546394046fea00ad767812827a90debb78b5 > examples/bad_rsa_4096.pem > PASS > > bad modulus: > COMPROMISED: ff64d7f83c9701d5fa7958ef2c82003451fa91ee > PASS > > good_req.csr: > Skipped: 'examples/good_req.csr' has unsupported bit size > PASS > > good_req.csr (stdin): > Skipped: '-' has unsupported bit size > PASS > > good_x509.pem: > Skipped: 'examples/good_x509.pem' has unsupported bit size > PASS > > good_x509.pem (stdin): > Skipped: '-' has unsupported bit size > PASS > > good_rsa.key: > Not blacklisted: 00844cdcf275a7ee6f73bdfab27af607f8c78f5b > examples/good_rsa.key > PASS > > good_rsa.key (stdin): > Not blacklisted: 00844cdcf275a7ee6f73bdfab27af607f8c78f5b - > PASS > > all good files (examples/good_req.csr examples/good_x509.pem > examples/good_rsa.key): > Skipped: 'examples/good_req.csr' has unsupported bit size > Skipped: 'examples/good_x509.pem' has unsupported bit size > Not blacklisted: 00844cdcf275a7ee6f73bdfab27af607f8c78f5b > examples/good_rsa.key > PASS > > some bad files, some good files (examples/bad_req.csr examples/bad_x509.pem > examples/bad_rsa.key examples/bad_rsa_4096.pem examples/bad_x509_4096.pem > examples/good_req.csr examples/good_x509.pem examples/good_rsa.key): > Skipped: 'examples/bad_req.csr' has unsupported bit size > Skipped: 'examples/bad_x509.pem' has unsupported bit size > Skipped: 'examples/bad_x509_4096.pem' has unsupported bit size > Skipped: 'examples/good_req.csr' has unsupported bit size > Skipped: 'examples/good_x509.pem' has unsupported bit size > COMPROMISED: 58dce70acfd4dc1a9d28722fc62edb8d30110778 examples/bad_rsa.key > COMPROMISED: 35f8546394046fea00ad767812827a90debb78b5 > examples/bad_rsa_4096.pem > Not blacklisted: 00844cdcf275a7ee6f73bdfab27af607f8c78f5b > examples/good_rsa.key > PASS > > good modulus: > Not blacklisted: ad385a7bd24e9ef98198404cb98f3adc614e527e > PASS > > Non-existent file: > PASS > > Permission denied: > PASS > > ---------------------- > FAILED > make: *** [build-stamp] Error 1 The full build log is available from: http://people.debian.org/~lucas/logs/2011/05/28/openssl-blacklist_0.5-2_lsid64.buildlog A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! About the archive rebuild: The rebuild was done on about 50 AMD64 nodes of the Grid'5000 platform, using a clean chroot. Internet was not accessible from the build systems. -- | Lucas Nussbaum | lu...@lucas-nussbaum.net http://www.lucas-nussbaum.net/ | | jabber: lu...@nussbaum.fr GPG: 1024D/023B3F4F | -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org