On Mon, Jul 06, 2009 at 09:49:30PM +0200, Salvatore Bonaccorso wrote: > Package: libio-socket-ssl-perl > Version: 1.16-1 > Severity: serious > Justification: FTBFS > > During trying to backport the bugfixes for the security bug #535946 I > noticed that libio-socket-ssl-perl FTBFS on lenny. > > Attached is my buildlog in a up lenny cowbuilder environment.
I think the problem is this: % openssl x509 -text -in certs/server-wildcard.pem|grep -A2 Validity Validity Not Before: Feb 22 08:06:33 2008 GMT Not After : Feb 21 08:06:33 2009 GMT Looking at the changelog, the test certificates were renewed upstream in 1.23 and 1.24. That doesn't help us much, cherry-picking those will only lead to another timebomb in the future. I suggest disabling (most of?) the tests for the lenny security upload. As for sid/squeeze, I think the best thing to do would be to work with upstream to make the test suite automatically generate the test certificates during the build. Cheers, -- Niko Tyni nt...@debian.org -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org