Your message dated Mon, 17 Sep 2018 06:49:08 +0000
with message-id <e1g1nli-00033w...@fasolo.debian.org>
and subject line Bug#908942: fixed in libio-socket-ssl-perl 2.060-1
has caused the Debian Bug report #908942,
regarding libio-socket-ssl-perl: FTBFS: Connection refused at 
t/verify_fingerprint.t line 49 and tests hang
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
908942: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908942
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:libio-socket-ssl-perl
Version: 2.059-3
Severity: serious
Justification: fails to build from source (but built successfully in the past)

https://buildd.debian.org/status/fetch.php?pkg=libio-socket-ssl-perl&arch=all&ver=2.059-3&stamp=1537087640&raw=0

I am able to reproduce this if I run `prove -lb t/verify_fingerprint.t` several 
hundred times in a row, but I can't figure out what could be wrong.

Some times the test hangs, with parent calling wait(-1) and child doing 
accept(). Some times the test fails without hanging.

The test spawns two child processes, each one listening on a random port 
(chosen by the OS). The listen() call happens before the fork(), so it seems to 
me that a later connection attempt from the parent cannot fail.

The listen queue is set to 10, and each of the children is being connected less 
than 10 times.

The child processes are designed to exit when they are connected and 
disconnected without any data being sent. Perhaps this causes one of them to 
exit before the parent does its tests, but what other process makes that 
connection is a mistery.

I'll try adding some debugging output to the children and see if this "foreigh" 
connection attempt is the reason.


-- System Information:
Debian Release: buster/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 4.18.0-1-amd64 (SMP w/4 CPU cores)
Locale: clean
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

--- End Message ---
--- Begin Message ---
Source: libio-socket-ssl-perl
Source-Version: 2.060-1

We believe that the bug you reported is fixed in the latest version of
libio-socket-ssl-perl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 908...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Damyan Ivanov <d...@debian.org> (supplier of updated libio-socket-ssl-perl 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 17 Sep 2018 06:41:12 +0000
Source: libio-socket-ssl-perl
Binary: libio-socket-ssl-perl
Architecture: source
Version: 2.060-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group <pkg-perl-maintain...@lists.alioth.debian.org>
Changed-By: Damyan Ivanov <d...@debian.org>
Closes: 908942
Description: 
 libio-socket-ssl-perl - Perl module implementing object oriented interface to 
SSL sockets
Changes:
 libio-socket-ssl-perl (2.060-1) unstable; urgency=medium
 .
   * New upstream version 2.060
     + drop all the patches (merged upstream)
     + Fixes test failures with openssl 1.1.1 (Closes: #908942)
Checksums-Sha1: 
 859e2e348f179d099426a48b53ec6e9ac009816c 2530 libio-socket-ssl-perl_2.060-1.dsc
 d00985ca87425ab5860bc38e59bcb9d39b372508 233169 
libio-socket-ssl-perl_2.060.orig.tar.gz
 25ed200b7858e780db62c70cc5b1aacb1503e033 10084 
libio-socket-ssl-perl_2.060-1.debian.tar.xz
Checksums-Sha256: 
 bfda6f19d817ca4ab174235d5d5e61637ac2d9e8a8b44490d22b1913d54a354d 2530 
libio-socket-ssl-perl_2.060-1.dsc
 fb5b2877ac5b686a5d7b8dd71cf5464ffe75d10c32047b5570674870e46b1b8c 233169 
libio-socket-ssl-perl_2.060.orig.tar.gz
 09fa3b75f9e908920dc04c952f739d5d1b3ec58d77c913febb0d344db42ecc46 10084 
libio-socket-ssl-perl_2.060-1.debian.tar.xz
Files: 
 083e4e524933eda0c6b64c68a879c253 2530 perl optional 
libio-socket-ssl-perl_2.060-1.dsc
 97fa6cd64f15db60f810cd8ab02d57fc 233169 perl optional 
libio-socket-ssl-perl_2.060.orig.tar.gz
 972599e08d30c349ca84549c5c2ac43c 10084 perl optional 
libio-socket-ssl-perl_2.060-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=Lzyq
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to