Your message dated Tue, 10 Jan 2017 22:01:34 +0000
with message-id <e1cr4u2-000fph...@fasolo.debian.org>
and subject line Bug#849628: fixed in ufw 0.35-3
has caused the Debian Bug report #849628,
regarding ufw: FTBFS: Command '--dry-run route allow ssh/udp' exited with '1', 
but expected '0'
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
849628: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849628
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ufw
Version: 0.35-2
Severity: serious
Justification: fails to build from source
User: reproducible-bui...@lists.alioth.debian.org
Usertags: ftbfs
X-Debbugs-Cc: reproducible-b...@lists.alioth.debian.org

Dear Maintainer,

ufw fails to build from source in unstable/amd64:

  […]

  test_get_iptables_version (tests.unit.test_util.UtilTestCase)
  Test get_iptables_version() ... ok
  test_get_netfilter_capabilities (tests.unit.test_util.UtilTestCase)
  Test get_netfilter_capabilities() ... ok
  test_get_netstat_output (tests.unit.test_util.UtilTestCase)
  Test get_netstat_output() ... (TODO: fake-netstat) could not find tcp in:
  
  (TODO: fake-netstat) could not find udp in:
  
  (TODO: fake-netstat) could not find tcp in:
  
  (TODO: fake-netstat) could not find udp in:
  
  ok
  test_get_ppid (tests.unit.test_util.UtilTestCase)
  Test get_ppid() ... ok
  test_get_services_proto (tests.unit.test_util.UtilTestCase)
  Test get_services_proto() ... ok
  test_hex_decode (tests.unit.test_util.UtilTestCase)
  Test hex_decode() output ... ok
  test_hex_encode (tests.unit.test_util.UtilTestCase)
  Test hex_encode() output ... ok
  test_human_sort (tests.unit.test_util.UtilTestCase)
  Test human_sort() ... ok
  test_in_network (tests.unit.test_util.UtilTestCase)
  Test in_network() ... ok
  test_msg (tests.unit.test_util.UtilTestCase)
  Test msg() ... test msg()
  ('test msg()' output is intentional)
  test msg()
  ('test msg()' output is intentional)
  ok
  test_normalize_address_host_netmask (tests.unit.test_util.UtilTestCase)
  Test normalize_address() with host_netmask ... ok
  test_normalize_address_invalid_netmask (tests.unit.test_util.UtilTestCase)
  Test normalize_address() with invalid_netmask ... ok
  test_normalize_address_ipv6_cidr (tests.unit.test_util.UtilTestCase)
  Test normalize_address() with ipv6_cidr ... ok
  test_normalize_address_ipv6_short_notation (tests.unit.test_util.UtilTestCase)
  Test normalize_address() with ipv6_short_notation ... ok
  test_normalize_address_netmask_to_cidr (tests.unit.test_util.UtilTestCase)
  Test normalize_address() with netmask_to_cidr ... ok
  test_normalize_address_valid_netmask_to_non_cidr 
(tests.unit.test_util.UtilTestCase)
  Test normalize_address() with valid_netmask_to_non_cidr ... ok
  test_open_file_read (tests.unit.test_util.UtilTestCase)
  Test open_file_read() ... ok
  test_open_files (tests.unit.test_util.UtilTestCase)
  Test open_files() ... ok
  test_parse_netstat_output (tests.unit.test_util.UtilTestCase)
  Test parse_netstat_output() ... ok
  test_parse_port_proto (tests.unit.test_util.UtilTestCase)
  Test parse_port_proto() ... ok
  test_under_ssh (tests.unit.test_util.UtilTestCase)
  Test under_ssh() ... WARN: Couldn't find pid (is /proc mounted?)
  ok
  test_valid_address (tests.unit.test_util.UtilTestCase)
  Test valid_address() ... ok
  test_valid_address4 (tests.unit.test_util.UtilTestCase)
  Test valid_address4() ... ok
  test_valid_address6 (tests.unit.test_util.UtilTestCase)
  Test valid_address6() ... WARN: python does not have IPv6 support.
  (IPv6 support warning is intentional)
  ok
  test_valid_netmask (tests.unit.test_util.UtilTestCase)
  Test valid_netmask() ... ok
  test_warn (tests.unit.test_util.UtilTestCase)
  Test warn() ... WARN: test warn()
  ('WARN: test warn()' output is intentional)
  ok
  test_word_wrap (tests.unit.test_util.UtilTestCase)
  Test word_wrap() ... ok
  test_wrap_text (tests.unit.test_util.UtilTestCase)
  Test wrap_text() ... ok
  test_write_to_file (tests.unit.test_util.UtilTestCase)
  Test write_to_file() ... ok
  
  ----------------------------------------------------------------------
  Ran 45 tests in 0.301s
  
  OK
  
  ------------------
  Unit tests summary
  ------------------
  Total=8 (Passed=8, Failed=0)
  
  
  make[1]: Entering directory '«BUILDDIR»'
  rm -rf ./build
  rm -rf ./staging
  rm -rf ./tests/testarea ./tests/unit/tmp
  rm -rf ./tmp
  rm -rf ./snap
  rm -f ./locales/mo/*.mo
  rm -f ./tests/unit/*.pyc ./tests/*.pyc ./src/*.pyc
  rm -rf ./tests/unit/__pycache__ ./tests/__pycache__ ./src/__pycache__
  rm -rf ./.coverage
  rm -f ./ufw               # unittest symlink
  make[1]: Leaving directory '«BUILDDIR»'
  = Functional Tests =
  
  Performing tests 'installation/check_help'
  - installing
  - result: 
      PASS
  
  Performing tests 'installation/check_root'
  - installing
  - result: 
      PASS
  
  Performing tests 'bad/apps'
  - installing
  - result: 
      PASS
  
  Performing tests 'bad/args'
  - installing
  - result: 
      PASS
  
  Performing tests 'bad/netmasks'
  - installing
  - result: 
      PASS
  
  Performing tests 'bad/policy'
  - installing
  - result: 
      PASS
  
  Performing tests 'bugs/apps'
  - installing
  - result: 
      PASS
  
  Performing tests 'bugs/misc'
  - installing
  - result: 
      PASS
  
  Performing tests 'bugs/rules'
  - installing
  - result: 
      PASS
  
  Performing tests 'good/apps'
  - installing
  - result: 
      PASS
  
  Performing tests 'good/args'
  - installing
  - result: 
      PASS
  
  Performing tests 'good/logging'
  - installing
  - result: 
      FAIL:
  126c126
  < ### tuple ### allow_log any 443 0.0.0.0/0 any 0.0.0.0/0 in
  ---
  > ### tuple ### allow_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
  131,134d130
  < -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m 
limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW ALLOW] "
  < -A ufw-user-logging-input -p udp --dport 443 -j RETURN
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
  < -A ufw-user-input -p udp --dport 443 -j ACCEPT
  334c330
  < ### tuple ### allow_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in
  ---
  > ### tuple ### allow_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
  339,342d334
  < -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min 
--limit-burst 10 -j LOG --log-prefix "[UFW ALLOW] "
  < -A ufw-user-logging-input -p udp --dport 443 -j RETURN
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
  < -A ufw-user-input -p udp --dport 443 -j ACCEPT
  542c534
  < ### tuple ### deny_log any 443 0.0.0.0/0 any 0.0.0.0/0 in
  ---
  > ### tuple ### deny_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
  547,550d538
  < -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m 
limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
  < -A ufw-user-logging-input -p udp --dport 443 -j RETURN
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
  < -A ufw-user-input -p udp --dport 443 -j DROP
  750c738
  < ### tuple ### deny_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in
  ---
  > ### tuple ### deny_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
  755,758d742
  < -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min 
--limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
  < -A ufw-user-logging-input -p udp --dport 443 -j RETURN
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
  < -A ufw-user-input -p udp --dport 443 -j DROP
  966c950
  < ### tuple ### limit_log any 443 0.0.0.0/0 any 0.0.0.0/0 in
  ---
  > ### tuple ### limit_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
  973,978d956
  < -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m 
limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW LIMIT] "
  < -A ufw-user-logging-input -p udp --dport 443 -j RETURN
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
  < -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent 
--set
  < -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent 
--update --seconds 30 --hitcount 6 -j ufw-user-limit
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-limit-accept
  1198c1176
  < ### tuple ### limit_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in
  ---
  > ### tuple ### limit_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
  1205,1210d1182
  < -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min 
--limit-burst 10 -j LOG --log-prefix "[UFW LIMIT] "
  < -A ufw-user-logging-input -p udp --dport 443 -j RETURN
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
  < -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent 
--set
  < -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent 
--update --seconds 30 --hitcount 6 -j ufw-user-limit
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-limit-accept
  1422c1394
  < ### tuple ### reject_log any 443 0.0.0.0/0 any 0.0.0.0/0 in
  ---
  > ### tuple ### reject_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
  1427,1430d1398
  < -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m 
limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
  < -A ufw-user-logging-input -p udp --dport 443 -j RETURN
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
  < -A ufw-user-input -p udp --dport 443 -j REJECT
  1630c1598
  < ### tuple ### reject_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in
  ---
  > ### tuple ### reject_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
  1635,1638d1602
  < -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min 
--limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
  < -A ufw-user-logging-input -p udp --dport 443 -j RETURN
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
  < -A ufw-user-input -p udp --dport 443 -j REJECT
  
  Performing tests 'good/netmasks'
  - installing
  - result: 
      PASS
  
  Performing tests 'good/policy'
  - installing
  - result: 
      PASS
  
  Performing tests 'good/reports'
  - installing
  - result: 
      PASS
  
  Performing tests 'good/route'
  - installing
  - result: 
  Command '--dry-run route allow ssh/udp' exited with '1', but expected '0'
      ** FAIL **
  
  Performing tests 'good/rules'
  - installing
  - result: 
  Command '--dry-run allow ssh/udp' exited with '1', but expected '0'
      ** FAIL **
  
  Performing tests 'ipv6/bad_args6'
  - installing
  - result: 
      PASS
  
  Performing tests 'ipv6/good_args6'
  - installing
  - result: 
      PASS
  
  Performing tests 'ipv6/logging'
  - installing
  - result: 
      PASS
  
  Performing tests 'ipv6/rules6'
  - installing
  - result: 
  Command '--dry-run allow to 2001:db8:3:4:5:6:7:8 port tftp from 2001:db8::/32 
port ssh' exited with '1', but expected '0'
      ** FAIL **
  
  Performing tests 'ipv6/rules64'
  - installing
  - result: 
  Command '--dry-run allow ssh/udp' exited with '1', but expected '0'
      ** FAIL **
  
  ------------------------
  Functional tests summary
  ------------------------
  Attempted:           22 (2222 individual tests)
  Skipped:             0
  Errors:              5
  debian/rules:32: recipe for target 'install' failed
  make: *** [install] Error 1
  dpkg-buildpackage: error: fakeroot debian/rules binary gave error exit status 
2

  […]

The full build log is attached.


Regards,

-- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      la...@debian.org / chris-lamb.co.uk
       `-

Attachment: ufw.0.35-2.unstable.amd64.log.txt.gz
Description: Binary data


--- End Message ---
--- Begin Message ---
Source: ufw
Source-Version: 0.35-3

We believe that the bug you reported is fixed in the latest version of
ufw, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 849...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jamie Strandboge <ja...@ubuntu.com> (supplier of updated ufw package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 08 Jan 2017 16:33:45 +0000
Source: ufw
Binary: ufw python-ufw
Architecture: source all
Version: 0.35-3
Distribution: unstable
Urgency: medium
Maintainer: Jamie Strandboge <ja...@ubuntu.com>
Changed-By: Jamie Strandboge <ja...@ubuntu.com>
Description:
 python-ufw - Uncomplicated FireWall Python modules
 ufw        - program for managing a Netfilter firewall
Closes: 849628
Changes:
 ufw (0.35-3) unstable; urgency=medium
 .
   * 0002-bug849628.patch: adjust testsuite for recent changes to netbase
     (Closes: 849628)
   * 0003-use-default-tcp-syncookies.patch: don't override distribution default
     for TCP syncookies
   * 0004-lp1633698.patch: adjust ufw6-before-output rules for echo-reply and
     echo-request (LP: #1633698)
   * update debian/before6.rules.md5sum
   * fix lintian errors:
     - debian/control: Build-Depends on dh-python and debhelper >= 9
     - debian/compat: use compatibility level 9
Checksums-Sha1:
 5283724d8661a21de0cd5e684553cd0e158b1944 1951 ufw_0.35-3.dsc
 80bf10b9f788131b9ac64e60907bb032ee8700f4 58316 ufw_0.35-3.debian.tar.xz
 d12359df57528d0b62ec09d84e66d84d648d96a6 52886 python-ufw_0.35-3_all.deb
 314bbcc62081d1e0c63f576b38bac7455329f21b 164224 ufw_0.35-3_all.deb
 e4880afcda872dd2a8700a4e12081b0ca38c2ff3 6387 ufw_0.35-3_amd64.buildinfo
Checksums-Sha256:
 98986c20b81867695a64af2a14fc43f3219314f1b5fb0df1cdab890a8eff6321 1951 
ufw_0.35-3.dsc
 78f581dc43119b302e64f9eda9851b606b3a3db22ae001fd499f689626039cba 58316 
ufw_0.35-3.debian.tar.xz
 3a226dc05d16a090d617eed28fb056f3bcb604d3a9687ca2540980df2e80c040 52886 
python-ufw_0.35-3_all.deb
 323d19fe6e540634c20235ecb42d8c0bcda4a783269c59643b77e7ac91045eda 164224 
ufw_0.35-3_all.deb
 942a570ac8ef0352bd77513e6ef45b1196c4bcaa301139602d193f8d6cabc8d5 6387 
ufw_0.35-3_amd64.buildinfo
Files:
 0cf113fc60697e257175fe59ad8d1064 1951 admin optional ufw_0.35-3.dsc
 0a2bf9233440e2ecd29816a41f95cc96 58316 admin optional ufw_0.35-3.debian.tar.xz
 a2c2039ed91ae0568dccbe723e78d984 52886 python optional 
python-ufw_0.35-3_all.deb
 5653db073ea8dd7a6cd1a40172ae425e 164224 admin optional ufw_0.35-3_all.deb
 344124a5b6865bdb943225a098dc33f9 6387 admin optional ufw_0.35-3_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Kees Cook <k...@outflux.net>
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=VNx1
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to