Your message dated Mon, 17 Sep 2018 12:05:36 +0000
with message-id <e1g1shy-00042g...@fasolo.debian.org>
and subject line Bug#908942: fixed in libio-socket-ssl-perl 2.060-2
has caused the Debian Bug report #908942,
regarding src:libio-socket-ssl-perl: FTBFS: test failures with openssl 1.1.1
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
908942: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908942
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:libio-socket-ssl-perl
Version: 2.059-3
Severity: serious
Justification: fails to build from source (but built successfully in the past)
https://buildd.debian.org/status/fetch.php?pkg=libio-socket-ssl-perl&arch=all&ver=2.059-3&stamp=1537087640&raw=0
I am able to reproduce this if I run `prove -lb t/verify_fingerprint.t` several
hundred times in a row, but I can't figure out what could be wrong.
Some times the test hangs, with parent calling wait(-1) and child doing
accept(). Some times the test fails without hanging.
The test spawns two child processes, each one listening on a random port
(chosen by the OS). The listen() call happens before the fork(), so it seems to
me that a later connection attempt from the parent cannot fail.
The listen queue is set to 10, and each of the children is being connected less
than 10 times.
The child processes are designed to exit when they are connected and
disconnected without any data being sent. Perhaps this causes one of them to
exit before the parent does its tests, but what other process makes that
connection is a mistery.
I'll try adding some debugging output to the children and see if this "foreigh"
connection attempt is the reason.
-- System Information:
Debian Release: buster/sid
APT prefers unstable-debug
APT policy: (500, 'unstable-debug'), (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 4.18.0-1-amd64 (SMP w/4 CPU cores)
Locale: clean
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
--- End Message ---
--- Begin Message ---
Source: libio-socket-ssl-perl
Source-Version: 2.060-2
We believe that the bug you reported is fixed in the latest version of
libio-socket-ssl-perl, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 908...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Damyan Ivanov <d...@debian.org> (supplier of updated libio-socket-ssl-perl
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Mon, 17 Sep 2018 11:56:24 +0000
Source: libio-socket-ssl-perl
Binary: libio-socket-ssl-perl
Architecture: source
Version: 2.060-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group <pkg-perl-maintain...@lists.alioth.debian.org>
Changed-By: Damyan Ivanov <d...@debian.org>
Closes: 908942
Description:
libio-socket-ssl-perl - Perl module implementing object oriented interface to
SSL sockets
Changes:
libio-socket-ssl-perl (2.060-2) unstable; urgency=medium
.
* patch more tests to ignore SIGPIPE (Closes: #908942)
Checksums-Sha1:
2cbd7c4513ffbfbcda21599c59e1c86985a0766c 2530 libio-socket-ssl-perl_2.060-2.dsc
37f145b4240f4af00f5966ec14c0175e2e3acf0b 10972
libio-socket-ssl-perl_2.060-2.debian.tar.xz
Checksums-Sha256:
268e324af20657c1958558c085e59dad231067cf2dca2449116dbf690b5d60a5 2530
libio-socket-ssl-perl_2.060-2.dsc
84e9ff4f39ade1efa0457ab75f73cdf715b356118cc88b6b0d08baa8065ac8b4 10972
libio-socket-ssl-perl_2.060-2.debian.tar.xz
Files:
1cf32a5a0fbda81f10701a1a21552268 2530 perl optional
libio-socket-ssl-perl_2.060-2.dsc
3b58434335e86e81a831a480aa81f0ec 10972 perl optional
libio-socket-ssl-perl_2.060-2.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=STtl
-----END PGP SIGNATURE-----
--- End Message ---