Your message dated Wed, 05 Sep 2018 21:05:15 +0000
with message-id <e1fxezd-000d23...@fasolo.debian.org>
and subject line Bug#907954: fixed in dulwich 0.19.6-2
has caused the Debian Bug report #907954,
regarding dulwich FTBFS: ValueError: invalid literal for int() with base 16:
'Stat'
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
907954: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907954
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: dulwich
Version: 0.19.6-1
Severity: serious
Tags: ftbfs
Some recent change in unstable makes dulwich FTBFS:
https://tests.reproducible-builds.org/debian/history/dulwich.html
https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/dulwich.html
...
======================================================================
ERROR: test_fetch_pack (dulwich.tests.compat.test_client.DulwichHttpClientTest)
----------------------------------------------------------------------
Traceback (most recent call last):
File "dulwich/tests/compat/test_client.py", line 208, in test_fetch_pack
result = c.fetch(self._build_path('/server_new.export'), dest)
File "dulwich/client.py", line 364, in fetch
progress)
File "dulwich/client.py", line 1544, in fetch_pack
b"git-upload-pack", url)
File "dulwich/client.py", line 1456, in _discover_references
return read_pkt_refs(proto) + (base_url, )
File "dulwich/client.py", line 196, in read_pkt_refs
for pkt in proto.read_pkt_seq():
File "dulwich/protocol.py", line 254, in read_pkt_seq
pkt = self.read_pkt_line()
File "dulwich/protocol.py", line 203, in read_pkt_line
size = int(sizestr, 16)
ValueError: invalid literal for int() with base 16: 'Stat'
======================================================================
ERROR: test_fetch_pack_no_side_band_64k
(dulwich.tests.compat.test_client.DulwichHttpClientTest)
----------------------------------------------------------------------
Traceback (most recent call last):
File "dulwich/tests/compat/test_client.py", line 241, in
test_fetch_pack_no_side_band_64k
result = c.fetch(self._build_path('/server_new.export'), dest)
File "dulwich/client.py", line 364, in fetch
progress)
File "dulwich/client.py", line 1544, in fetch_pack
b"git-upload-pack", url)
File "dulwich/client.py", line 1456, in _discover_references
return read_pkt_refs(proto) + (base_url, )
File "dulwich/client.py", line 196, in read_pkt_refs
for pkt in proto.read_pkt_seq():
File "dulwich/protocol.py", line 254, in read_pkt_seq
pkt = self.read_pkt_line()
File "dulwich/protocol.py", line 203, in read_pkt_line
size = int(sizestr, 16)
ValueError: invalid literal for int() with base 16: 'Stat'
...
Ran 1268 tests in 81.669s
FAILED (errors=12, skipped=65)
make[2]: *** [Makefile:32: check] Error 1
--- End Message ---
--- Begin Message ---
Source: dulwich
Source-Version: 0.19.6-2
We believe that the bug you reported is fixed in the latest version of
dulwich, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 907...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Jelmer Vernooij <jel...@debian.org> (supplier of updated dulwich package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 05 Sep 2018 21:23:16 +0100
Source: dulwich
Binary: python-dulwich pypy-dulwich python3-dulwich
Architecture: source
Version: 0.19.6-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Python Modules Team
<python-modules-t...@lists.alioth.debian.org>
Changed-By: Jelmer Vernooij <jel...@debian.org>
Description:
pypy-dulwich - Python Git library - pypy module
python-dulwich - Python Git library
python3-dulwich - Python Git library - Python3 module
Closes: 907954
Changes:
dulwich (0.19.6-2) unstable; urgency=medium
.
* Add patch 02_newer_git, fixing compatibility with newer versions of
git. Closes: #907954
Checksums-Sha1:
6c28d401ad4781ca7ed566bdafd1a2f8c962c9fb 2582 dulwich_0.19.6-2.dsc
7f3a056dd5ddf10b48498e865ed8f02c801e45c0 46200 dulwich_0.19.6-2.debian.tar.xz
5d32d158fbc100138021f1773754aabe6499e76a 8784 dulwich_0.19.6-2_source.buildinfo
Checksums-Sha256:
658d7c11f3d80e0dc7cf58d480876d852634dfc1f9b332fc180b22e7122cc1a7 2582
dulwich_0.19.6-2.dsc
6657fb1c84797c89381e5e7a3ecfee487716d9a12950db9b065268d2f816b874 46200
dulwich_0.19.6-2.debian.tar.xz
901dc02a4a592fb5505104a13ca192b74cccde3b34e7079cbcb2d26fefd2413b 8784
dulwich_0.19.6-2_source.buildinfo
Files:
2e9063805f54084ec8094a7348499b94 2582 python optional dulwich_0.19.6-2.dsc
6ded6232c4d7884a98a085a0b4e88a9c 46200 python optional
dulwich_0.19.6-2.debian.tar.xz
5a1f205a4cba89ce784aa8cc4b2d0ba8 8784 python optional
dulwich_0.19.6-2_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=tyTM
-----END PGP SIGNATURE-----
--- End Message ---