Your message dated Tue, 10 Jan 2017 22:01:34 +0000 with message-id <e1cr4u2-000fph...@fasolo.debian.org> and subject line Bug#849628: fixed in ufw 0.35-3 has caused the Debian Bug report #849628, regarding ufw: FTBFS: Command '--dry-run route allow ssh/udp' exited with '1', but expected '0' to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 849628: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849628 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Source: ufw Version: 0.35-2 Severity: serious Justification: fails to build from source User: reproducible-bui...@lists.alioth.debian.org Usertags: ftbfs X-Debbugs-Cc: reproducible-b...@lists.alioth.debian.org Dear Maintainer, ufw fails to build from source in unstable/amd64: […] test_get_iptables_version (tests.unit.test_util.UtilTestCase) Test get_iptables_version() ... ok test_get_netfilter_capabilities (tests.unit.test_util.UtilTestCase) Test get_netfilter_capabilities() ... ok test_get_netstat_output (tests.unit.test_util.UtilTestCase) Test get_netstat_output() ... (TODO: fake-netstat) could not find tcp in: (TODO: fake-netstat) could not find udp in: (TODO: fake-netstat) could not find tcp in: (TODO: fake-netstat) could not find udp in: ok test_get_ppid (tests.unit.test_util.UtilTestCase) Test get_ppid() ... ok test_get_services_proto (tests.unit.test_util.UtilTestCase) Test get_services_proto() ... ok test_hex_decode (tests.unit.test_util.UtilTestCase) Test hex_decode() output ... ok test_hex_encode (tests.unit.test_util.UtilTestCase) Test hex_encode() output ... ok test_human_sort (tests.unit.test_util.UtilTestCase) Test human_sort() ... ok test_in_network (tests.unit.test_util.UtilTestCase) Test in_network() ... ok test_msg (tests.unit.test_util.UtilTestCase) Test msg() ... test msg() ('test msg()' output is intentional) test msg() ('test msg()' output is intentional) ok test_normalize_address_host_netmask (tests.unit.test_util.UtilTestCase) Test normalize_address() with host_netmask ... ok test_normalize_address_invalid_netmask (tests.unit.test_util.UtilTestCase) Test normalize_address() with invalid_netmask ... ok test_normalize_address_ipv6_cidr (tests.unit.test_util.UtilTestCase) Test normalize_address() with ipv6_cidr ... ok test_normalize_address_ipv6_short_notation (tests.unit.test_util.UtilTestCase) Test normalize_address() with ipv6_short_notation ... ok test_normalize_address_netmask_to_cidr (tests.unit.test_util.UtilTestCase) Test normalize_address() with netmask_to_cidr ... ok test_normalize_address_valid_netmask_to_non_cidr (tests.unit.test_util.UtilTestCase) Test normalize_address() with valid_netmask_to_non_cidr ... ok test_open_file_read (tests.unit.test_util.UtilTestCase) Test open_file_read() ... ok test_open_files (tests.unit.test_util.UtilTestCase) Test open_files() ... ok test_parse_netstat_output (tests.unit.test_util.UtilTestCase) Test parse_netstat_output() ... ok test_parse_port_proto (tests.unit.test_util.UtilTestCase) Test parse_port_proto() ... ok test_under_ssh (tests.unit.test_util.UtilTestCase) Test under_ssh() ... WARN: Couldn't find pid (is /proc mounted?) ok test_valid_address (tests.unit.test_util.UtilTestCase) Test valid_address() ... ok test_valid_address4 (tests.unit.test_util.UtilTestCase) Test valid_address4() ... ok test_valid_address6 (tests.unit.test_util.UtilTestCase) Test valid_address6() ... WARN: python does not have IPv6 support. (IPv6 support warning is intentional) ok test_valid_netmask (tests.unit.test_util.UtilTestCase) Test valid_netmask() ... ok test_warn (tests.unit.test_util.UtilTestCase) Test warn() ... WARN: test warn() ('WARN: test warn()' output is intentional) ok test_word_wrap (tests.unit.test_util.UtilTestCase) Test word_wrap() ... ok test_wrap_text (tests.unit.test_util.UtilTestCase) Test wrap_text() ... ok test_write_to_file (tests.unit.test_util.UtilTestCase) Test write_to_file() ... ok ---------------------------------------------------------------------- Ran 45 tests in 0.301s OK ------------------ Unit tests summary ------------------ Total=8 (Passed=8, Failed=0) make[1]: Entering directory '«BUILDDIR»' rm -rf ./build rm -rf ./staging rm -rf ./tests/testarea ./tests/unit/tmp rm -rf ./tmp rm -rf ./snap rm -f ./locales/mo/*.mo rm -f ./tests/unit/*.pyc ./tests/*.pyc ./src/*.pyc rm -rf ./tests/unit/__pycache__ ./tests/__pycache__ ./src/__pycache__ rm -rf ./.coverage rm -f ./ufw # unittest symlink make[1]: Leaving directory '«BUILDDIR»' = Functional Tests = Performing tests 'installation/check_help' - installing - result: PASS Performing tests 'installation/check_root' - installing - result: PASS Performing tests 'bad/apps' - installing - result: PASS Performing tests 'bad/args' - installing - result: PASS Performing tests 'bad/netmasks' - installing - result: PASS Performing tests 'bad/policy' - installing - result: PASS Performing tests 'bugs/apps' - installing - result: PASS Performing tests 'bugs/misc' - installing - result: PASS Performing tests 'bugs/rules' - installing - result: PASS Performing tests 'good/apps' - installing - result: PASS Performing tests 'good/args' - installing - result: PASS Performing tests 'good/logging' - installing - result: FAIL: 126c126 < ### tuple ### allow_log any 443 0.0.0.0/0 any 0.0.0.0/0 in --- > ### tuple ### allow_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in 131,134d130 < -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW ALLOW] " < -A ufw-user-logging-input -p udp --dport 443 -j RETURN < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input < -A ufw-user-input -p udp --dport 443 -j ACCEPT 334c330 < ### tuple ### allow_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in --- > ### tuple ### allow_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in 339,342d334 < -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW ALLOW] " < -A ufw-user-logging-input -p udp --dport 443 -j RETURN < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input < -A ufw-user-input -p udp --dport 443 -j ACCEPT 542c534 < ### tuple ### deny_log any 443 0.0.0.0/0 any 0.0.0.0/0 in --- > ### tuple ### deny_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in 547,550d538 < -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] " < -A ufw-user-logging-input -p udp --dport 443 -j RETURN < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input < -A ufw-user-input -p udp --dport 443 -j DROP 750c738 < ### tuple ### deny_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in --- > ### tuple ### deny_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in 755,758d742 < -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] " < -A ufw-user-logging-input -p udp --dport 443 -j RETURN < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input < -A ufw-user-input -p udp --dport 443 -j DROP 966c950 < ### tuple ### limit_log any 443 0.0.0.0/0 any 0.0.0.0/0 in --- > ### tuple ### limit_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in 973,978d956 < -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW LIMIT] " < -A ufw-user-logging-input -p udp --dport 443 -j RETURN < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input < -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent --set < -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent --update --seconds 30 --hitcount 6 -j ufw-user-limit < -A ufw-user-input -p udp --dport 443 -j ufw-user-limit-accept 1198c1176 < ### tuple ### limit_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in --- > ### tuple ### limit_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in 1205,1210d1182 < -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW LIMIT] " < -A ufw-user-logging-input -p udp --dport 443 -j RETURN < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input < -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent --set < -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent --update --seconds 30 --hitcount 6 -j ufw-user-limit < -A ufw-user-input -p udp --dport 443 -j ufw-user-limit-accept 1422c1394 < ### tuple ### reject_log any 443 0.0.0.0/0 any 0.0.0.0/0 in --- > ### tuple ### reject_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in 1427,1430d1398 < -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] " < -A ufw-user-logging-input -p udp --dport 443 -j RETURN < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input < -A ufw-user-input -p udp --dport 443 -j REJECT 1630c1598 < ### tuple ### reject_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in --- > ### tuple ### reject_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in 1635,1638d1602 < -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] " < -A ufw-user-logging-input -p udp --dport 443 -j RETURN < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input < -A ufw-user-input -p udp --dport 443 -j REJECT Performing tests 'good/netmasks' - installing - result: PASS Performing tests 'good/policy' - installing - result: PASS Performing tests 'good/reports' - installing - result: PASS Performing tests 'good/route' - installing - result: Command '--dry-run route allow ssh/udp' exited with '1', but expected '0' ** FAIL ** Performing tests 'good/rules' - installing - result: Command '--dry-run allow ssh/udp' exited with '1', but expected '0' ** FAIL ** Performing tests 'ipv6/bad_args6' - installing - result: PASS Performing tests 'ipv6/good_args6' - installing - result: PASS Performing tests 'ipv6/logging' - installing - result: PASS Performing tests 'ipv6/rules6' - installing - result: Command '--dry-run allow to 2001:db8:3:4:5:6:7:8 port tftp from 2001:db8::/32 port ssh' exited with '1', but expected '0' ** FAIL ** Performing tests 'ipv6/rules64' - installing - result: Command '--dry-run allow ssh/udp' exited with '1', but expected '0' ** FAIL ** ------------------------ Functional tests summary ------------------------ Attempted: 22 (2222 individual tests) Skipped: 0 Errors: 5 debian/rules:32: recipe for target 'install' failed make: *** [install] Error 1 dpkg-buildpackage: error: fakeroot debian/rules binary gave error exit status 2 […] The full build log is attached. Regards, -- ,''`. : :' : Chris Lamb `. `'` la...@debian.org / chris-lamb.co.uk `-
ufw.0.35-2.unstable.amd64.log.txt.gz
Description: Binary data
--- End Message ---
--- Begin Message ---Source: ufw Source-Version: 0.35-3 We believe that the bug you reported is fixed in the latest version of ufw, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 849...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Jamie Strandboge <ja...@ubuntu.com> (supplier of updated ufw package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sun, 08 Jan 2017 16:33:45 +0000 Source: ufw Binary: ufw python-ufw Architecture: source all Version: 0.35-3 Distribution: unstable Urgency: medium Maintainer: Jamie Strandboge <ja...@ubuntu.com> Changed-By: Jamie Strandboge <ja...@ubuntu.com> Description: python-ufw - Uncomplicated FireWall Python modules ufw - program for managing a Netfilter firewall Closes: 849628 Changes: ufw (0.35-3) unstable; urgency=medium . * 0002-bug849628.patch: adjust testsuite for recent changes to netbase (Closes: 849628) * 0003-use-default-tcp-syncookies.patch: don't override distribution default for TCP syncookies * 0004-lp1633698.patch: adjust ufw6-before-output rules for echo-reply and echo-request (LP: #1633698) * update debian/before6.rules.md5sum * fix lintian errors: - debian/control: Build-Depends on dh-python and debhelper >= 9 - debian/compat: use compatibility level 9 Checksums-Sha1: 5283724d8661a21de0cd5e684553cd0e158b1944 1951 ufw_0.35-3.dsc 80bf10b9f788131b9ac64e60907bb032ee8700f4 58316 ufw_0.35-3.debian.tar.xz d12359df57528d0b62ec09d84e66d84d648d96a6 52886 python-ufw_0.35-3_all.deb 314bbcc62081d1e0c63f576b38bac7455329f21b 164224 ufw_0.35-3_all.deb e4880afcda872dd2a8700a4e12081b0ca38c2ff3 6387 ufw_0.35-3_amd64.buildinfo Checksums-Sha256: 98986c20b81867695a64af2a14fc43f3219314f1b5fb0df1cdab890a8eff6321 1951 ufw_0.35-3.dsc 78f581dc43119b302e64f9eda9851b606b3a3db22ae001fd499f689626039cba 58316 ufw_0.35-3.debian.tar.xz 3a226dc05d16a090d617eed28fb056f3bcb604d3a9687ca2540980df2e80c040 52886 python-ufw_0.35-3_all.deb 323d19fe6e540634c20235ecb42d8c0bcda4a783269c59643b77e7ac91045eda 164224 ufw_0.35-3_all.deb 942a570ac8ef0352bd77513e6ef45b1196c4bcaa301139602d193f8d6cabc8d5 6387 ufw_0.35-3_amd64.buildinfo Files: 0cf113fc60697e257175fe59ad8d1064 1951 admin optional ufw_0.35-3.dsc 0a2bf9233440e2ecd29816a41f95cc96 58316 admin optional ufw_0.35-3.debian.tar.xz a2c2039ed91ae0568dccbe723e78d984 52886 python optional python-ufw_0.35-3_all.deb 5653db073ea8dd7a6cd1a40172ae425e 164224 admin optional ufw_0.35-3_all.deb 344124a5b6865bdb943225a098dc33f9 6387 admin optional ufw_0.35-3_amd64.buildinfo -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 Comment: Kees Cook <k...@outflux.net> iQIcBAEBCgAGBQJYdUzQAAoJEIly9N/cbcAmx0MP/iJGhjODNagh+bw4uy+Zybe3 qTIG4Uc4T8yulmvasZil6oiSvucEd8O87ItzP2bgM2fmvbF+PKsk6QTg3kE4GK8n oa3H/I9+I/zelrJjfKYcALDE95cyRYl8jrbLvcjZ5mNKtUB2ax7XBeVXTyj74hfg WnkPJvceuHKXPSsP4EtPiojLJn3TXrg9puQWpZ5p7AZI7F1qVZ5mnTSbF7EUPzwZ JO30I7iRaihvQ/TMlFkTOB+eV/L3cmnWEHES+CGI+2nMp+yI+P74K9fflTmjDZqw su45QKMde38g+ACe5q9WSoGffjAFUl2YKKSA+z+NiC2Bun+9H3WsKku6XdWGQquY 5dZ2RfLkg0h0tx5TeOOM3YLg54MO7ed974MeiuRVrO9K3/yY9nEpugK6PDnkzWmd xTVEnWLVZG5v7iCdcBqewVJuL81lowX3eSP3FaEmI1RqDXGaF/kFD7QHnTgjFwP7 3jMJoHR7HElF+YTTal2+Q7Q2nb/lALJGOpEOggTbGfMEog5NNTIdPtOoUobYU2hq geiZF4VVCtOVGy77xS1aEmZbMdhE8J1YE3Tzy4qIzgL1Tz7o9WlpdERXgJKJ66FC 1I+tNxojXulO07hs/Pt+ZQn3V4XKbkuDLpthqI1kfQHH7k2uoRz5N3BEho5KXpyQ ocTEG9qeiipH6pEsyx/q =VNx1 -----END PGP SIGNATURE-----
--- End Message ---