Your message dated Sat, 06 Oct 2018 13:35:18 +0000
with message-id <e1g8mjm-0004l1...@fasolo.debian.org>
and subject line Bug#900161: fixed in ruby-openssl 2.1.1-1
has caused the Debian Bug report #900161,
regarding ruby-openssl: FTBFS against openssl 1.1.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
900161: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900161
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ruby-openssl
Version: 2.0.5-1
Severity: important
User: pkg-openssl-de...@lists.alioth.debian.org
Usertags: openssl-1.1.1

The new openssl 1.1.1 is currently in experimental [0]. This package
failed to build against this new package [1] while it built fine against
the openssl version currently in unstable [2].
Could you please have a look?

The Error
|/<<PKGBUILDDIR>>/test/test_ssl.rb:1280:in `initialize': 
SSL_CTX_use_certificate: ee key too small (OpenSSL::SSL::SSLError)

is due to:
1.1.1~~pre6-1 changelog):
|   * Increase default security level from 1 to 2. This moves from the 80 bit
|     security level to the 112 bit securit level and will require 2048 bit RSA
|     and DHE keys.

[0] https://lists.debian.org/msgid-search/20180501211400.ga21...@roeckx.be
[1] 
https://breakpoint.cc/openssl-rebuild/2018-05-03-rebuild-openssl1.1.1-pre6/attempted/ruby-openssl_2.0.5-1_amd64-2018-05-01T21%3A05%3A24Z
[2] 
https://breakpoint.cc/openssl-rebuild/2018-05-03-rebuild-openssl1.1.1-pre6/successful/ruby-openssl_2.0.5-1_amd64-2018-05-02T18%3A51%3A30Z

Sebastian

--- End Message ---
--- Begin Message ---
Source: ruby-openssl
Source-Version: 2.1.1-1

We believe that the bug you reported is fixed in the latest version of
ruby-openssl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 900...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Antonio Terceiro <terce...@debian.org> (supplier of updated ruby-openssl 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 06 Oct 2018 10:24:43 -0300
Source: ruby-openssl
Binary: ruby-openssl
Architecture: source
Version: 2.1.1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers 
<pkg-ruby-extras-maintain...@lists.alioth.debian.org>
Changed-By: Antonio Terceiro <terce...@debian.org>
Description:
 ruby-openssl - Ruby bindings for OpenSSL
Closes: 900161
Changes:
 ruby-openssl (2.1.1-1) unstable; urgency=medium
 .
   * New upstream version 2.1.1
     - Drop patches, not applicable anymore
   * Bump debhelper compatibility level to 11
   * Bump Standards-Version to 4.2.1; no changed needed otherwise
   * Update Vcs-* fields to point to salsa.debian.org
   * debian/rules: install upstream changelog
   * Fix building against openssl 1.1.1 (Closes: #900161)
     - Apply patches from upstream pull request #217
       https://github.com/ruby/openssl/pull/217/commits
     - debian/ruby-tests.rake: Add $TESTOPTS to ignore two tests that still
       crash against openssl 1.1.1
Checksums-Sha1:
 36740e83fe7d81fa5f35f4e0a540961069dbafb2 2045 ruby-openssl_2.1.1-1.dsc
 e1f229fec50e65e3d6e19272e6302a2a26ff15b2 254704 ruby-openssl_2.1.1.orig.tar.gz
 8a3fe9bb969e139929cb5e0db0916a253b3282c5 14096 
ruby-openssl_2.1.1-1.debian.tar.xz
 b3d388992aac65e1f62882654f87caad62c58619 6981 
ruby-openssl_2.1.1-1_source.buildinfo
Checksums-Sha256:
 ec55868a87bd0f929dc4600794d10d0c6d8110b2b91b6bf61cd8f304bf367f5d 2045 
ruby-openssl_2.1.1-1.dsc
 b70f5114116c214354d1084f85360c908d9801db8bba43944b265f15af11f2bb 254704 
ruby-openssl_2.1.1.orig.tar.gz
 747d97a01c039a65d39082b89bfb07c6930e227ea803859e1176854906005e06 14096 
ruby-openssl_2.1.1-1.debian.tar.xz
 4de9f196a0202b2b6418491040a0801311e1fb0d5afcfa23f07d9f2f63658e6a 6981 
ruby-openssl_2.1.1-1_source.buildinfo
Files:
 2701bce18d52022296172229f10b9c90 2045 ruby optional ruby-openssl_2.1.1-1.dsc
 cb539761e511af284b5ef68ff5ad6d6b 254704 ruby optional 
ruby-openssl_2.1.1.orig.tar.gz
 66033e2d8218f15d265612d7ff48f126 14096 ruby optional 
ruby-openssl_2.1.1-1.debian.tar.xz
 43cec4d9bd69f1546e8fe1b6eb39b6b5 6981 ruby optional 
ruby-openssl_2.1.1-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=4l1C
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to