Source: ufw Version: 0.35-2 Severity: serious Justification: fails to build from source User: reproducible-bui...@lists.alioth.debian.org Usertags: ftbfs X-Debbugs-Cc: reproducible-b...@lists.alioth.debian.org
Dear Maintainer, ufw fails to build from source in unstable/amd64: […] test_get_iptables_version (tests.unit.test_util.UtilTestCase) Test get_iptables_version() ... ok test_get_netfilter_capabilities (tests.unit.test_util.UtilTestCase) Test get_netfilter_capabilities() ... ok test_get_netstat_output (tests.unit.test_util.UtilTestCase) Test get_netstat_output() ... (TODO: fake-netstat) could not find tcp in: (TODO: fake-netstat) could not find udp in: (TODO: fake-netstat) could not find tcp in: (TODO: fake-netstat) could not find udp in: ok test_get_ppid (tests.unit.test_util.UtilTestCase) Test get_ppid() ... ok test_get_services_proto (tests.unit.test_util.UtilTestCase) Test get_services_proto() ... ok test_hex_decode (tests.unit.test_util.UtilTestCase) Test hex_decode() output ... ok test_hex_encode (tests.unit.test_util.UtilTestCase) Test hex_encode() output ... ok test_human_sort (tests.unit.test_util.UtilTestCase) Test human_sort() ... ok test_in_network (tests.unit.test_util.UtilTestCase) Test in_network() ... ok test_msg (tests.unit.test_util.UtilTestCase) Test msg() ... test msg() ('test msg()' output is intentional) test msg() ('test msg()' output is intentional) ok test_normalize_address_host_netmask (tests.unit.test_util.UtilTestCase) Test normalize_address() with host_netmask ... ok test_normalize_address_invalid_netmask (tests.unit.test_util.UtilTestCase) Test normalize_address() with invalid_netmask ... ok test_normalize_address_ipv6_cidr (tests.unit.test_util.UtilTestCase) Test normalize_address() with ipv6_cidr ... ok test_normalize_address_ipv6_short_notation (tests.unit.test_util.UtilTestCase) Test normalize_address() with ipv6_short_notation ... ok test_normalize_address_netmask_to_cidr (tests.unit.test_util.UtilTestCase) Test normalize_address() with netmask_to_cidr ... ok test_normalize_address_valid_netmask_to_non_cidr (tests.unit.test_util.UtilTestCase) Test normalize_address() with valid_netmask_to_non_cidr ... ok test_open_file_read (tests.unit.test_util.UtilTestCase) Test open_file_read() ... ok test_open_files (tests.unit.test_util.UtilTestCase) Test open_files() ... ok test_parse_netstat_output (tests.unit.test_util.UtilTestCase) Test parse_netstat_output() ... ok test_parse_port_proto (tests.unit.test_util.UtilTestCase) Test parse_port_proto() ... ok test_under_ssh (tests.unit.test_util.UtilTestCase) Test under_ssh() ... WARN: Couldn't find pid (is /proc mounted?) ok test_valid_address (tests.unit.test_util.UtilTestCase) Test valid_address() ... ok test_valid_address4 (tests.unit.test_util.UtilTestCase) Test valid_address4() ... ok test_valid_address6 (tests.unit.test_util.UtilTestCase) Test valid_address6() ... WARN: python does not have IPv6 support. (IPv6 support warning is intentional) ok test_valid_netmask (tests.unit.test_util.UtilTestCase) Test valid_netmask() ... ok test_warn (tests.unit.test_util.UtilTestCase) Test warn() ... WARN: test warn() ('WARN: test warn()' output is intentional) ok test_word_wrap (tests.unit.test_util.UtilTestCase) Test word_wrap() ... ok test_wrap_text (tests.unit.test_util.UtilTestCase) Test wrap_text() ... ok test_write_to_file (tests.unit.test_util.UtilTestCase) Test write_to_file() ... ok ---------------------------------------------------------------------- Ran 45 tests in 0.301s OK ------------------ Unit tests summary ------------------ Total=8 (Passed=8, Failed=0) make[1]: Entering directory '«BUILDDIR»' rm -rf ./build rm -rf ./staging rm -rf ./tests/testarea ./tests/unit/tmp rm -rf ./tmp rm -rf ./snap rm -f ./locales/mo/*.mo rm -f ./tests/unit/*.pyc ./tests/*.pyc ./src/*.pyc rm -rf ./tests/unit/__pycache__ ./tests/__pycache__ ./src/__pycache__ rm -rf ./.coverage rm -f ./ufw # unittest symlink make[1]: Leaving directory '«BUILDDIR»' = Functional Tests = Performing tests 'installation/check_help' - installing - result: PASS Performing tests 'installation/check_root' - installing - result: PASS Performing tests 'bad/apps' - installing - result: PASS Performing tests 'bad/args' - installing - result: PASS Performing tests 'bad/netmasks' - installing - result: PASS Performing tests 'bad/policy' - installing - result: PASS Performing tests 'bugs/apps' - installing - result: PASS Performing tests 'bugs/misc' - installing - result: PASS Performing tests 'bugs/rules' - installing - result: PASS Performing tests 'good/apps' - installing - result: PASS Performing tests 'good/args' - installing - result: PASS Performing tests 'good/logging' - installing - result: FAIL: 126c126 < ### tuple ### allow_log any 443 0.0.0.0/0 any 0.0.0.0/0 in --- > ### tuple ### allow_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in 131,134d130 < -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW ALLOW] " < -A ufw-user-logging-input -p udp --dport 443 -j RETURN < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input < -A ufw-user-input -p udp --dport 443 -j ACCEPT 334c330 < ### tuple ### allow_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in --- > ### tuple ### allow_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in 339,342d334 < -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW ALLOW] " < -A ufw-user-logging-input -p udp --dport 443 -j RETURN < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input < -A ufw-user-input -p udp --dport 443 -j ACCEPT 542c534 < ### tuple ### deny_log any 443 0.0.0.0/0 any 0.0.0.0/0 in --- > ### tuple ### deny_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in 547,550d538 < -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] " < -A ufw-user-logging-input -p udp --dport 443 -j RETURN < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input < -A ufw-user-input -p udp --dport 443 -j DROP 750c738 < ### tuple ### deny_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in --- > ### tuple ### deny_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in 755,758d742 < -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] " < -A ufw-user-logging-input -p udp --dport 443 -j RETURN < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input < -A ufw-user-input -p udp --dport 443 -j DROP 966c950 < ### tuple ### limit_log any 443 0.0.0.0/0 any 0.0.0.0/0 in --- > ### tuple ### limit_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in 973,978d956 < -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW LIMIT] " < -A ufw-user-logging-input -p udp --dport 443 -j RETURN < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input < -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent --set < -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent --update --seconds 30 --hitcount 6 -j ufw-user-limit < -A ufw-user-input -p udp --dport 443 -j ufw-user-limit-accept 1198c1176 < ### tuple ### limit_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in --- > ### tuple ### limit_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in 1205,1210d1182 < -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW LIMIT] " < -A ufw-user-logging-input -p udp --dport 443 -j RETURN < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input < -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent --set < -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent --update --seconds 30 --hitcount 6 -j ufw-user-limit < -A ufw-user-input -p udp --dport 443 -j ufw-user-limit-accept 1422c1394 < ### tuple ### reject_log any 443 0.0.0.0/0 any 0.0.0.0/0 in --- > ### tuple ### reject_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in 1427,1430d1398 < -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] " < -A ufw-user-logging-input -p udp --dport 443 -j RETURN < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input < -A ufw-user-input -p udp --dport 443 -j REJECT 1630c1598 < ### tuple ### reject_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in --- > ### tuple ### reject_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in 1635,1638d1602 < -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] " < -A ufw-user-logging-input -p udp --dport 443 -j RETURN < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input < -A ufw-user-input -p udp --dport 443 -j REJECT Performing tests 'good/netmasks' - installing - result: PASS Performing tests 'good/policy' - installing - result: PASS Performing tests 'good/reports' - installing - result: PASS Performing tests 'good/route' - installing - result: Command '--dry-run route allow ssh/udp' exited with '1', but expected '0' ** FAIL ** Performing tests 'good/rules' - installing - result: Command '--dry-run allow ssh/udp' exited with '1', but expected '0' ** FAIL ** Performing tests 'ipv6/bad_args6' - installing - result: PASS Performing tests 'ipv6/good_args6' - installing - result: PASS Performing tests 'ipv6/logging' - installing - result: PASS Performing tests 'ipv6/rules6' - installing - result: Command '--dry-run allow to 2001:db8:3:4:5:6:7:8 port tftp from 2001:db8::/32 port ssh' exited with '1', but expected '0' ** FAIL ** Performing tests 'ipv6/rules64' - installing - result: Command '--dry-run allow ssh/udp' exited with '1', but expected '0' ** FAIL ** ------------------------ Functional tests summary ------------------------ Attempted: 22 (2222 individual tests) Skipped: 0 Errors: 5 debian/rules:32: recipe for target 'install' failed make: *** [install] Error 1 dpkg-buildpackage: error: fakeroot debian/rules binary gave error exit status 2 […] The full build log is attached. Regards, -- ,''`. : :' : Chris Lamb `. `'` la...@debian.org / chris-lamb.co.uk `-
ufw.0.35-2.unstable.amd64.log.txt.gz
Description: Binary data