Your message dated Mon, 29 Oct 2018 23:14:08 +0000
with message-id <e1ghgjy-000ebu...@fasolo.debian.org>
and subject line Bug#912234: fixed in commons-httpclient 3.1-15
has caused the Debian Bug report #912234,
regarding commons-httpclient FTBFS with OpenJDK 11
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
912234: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912234
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: commons-httpclient
Version: 3.1-14
Severity: serious
Tags: ftbfs
https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/commons-httpclient.html
...
[ERROR] Tests run: 591, Failures: 0, Errors: 29, Skipped: 0, Time elapsed:
24.172 s <<< FAILURE! - in org.apache.commons.httpclient.TestAll
[ERROR]
testTunnellingParamsHostHTTP10AndMethodHTTP11(org.apache.commons.httpclient.params.TestSSLTunnelParams)
Time elapsed: 0.45 s <<< ERROR!
javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake
at
java.base/sun.security.ssl.SSLSocketImpl.handleEOF(SSLSocketImpl.java:1321)
at
java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1160)
at
java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1063)
at
java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:402)
at
java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:716)
at
java.base/sun.security.ssl.SSLSocketImpl$AppOutputStream.write(SSLSocketImpl.java:970)
at
java.base/java.io.BufferedOutputStream.flushBuffer(BufferedOutputStream.java:81)
at
java.base/java.io.BufferedOutputStream.flush(BufferedOutputStream.java:142)
at
org.apache.commons.httpclient.HttpConnection.flushRequestOutputStream(HttpConnection.java:828)
at
org.apache.commons.httpclient.HttpMethodBase.writeRequest(HttpMethodBase.java:2116)
at
org.apache.commons.httpclient.HttpMethodBase.execute(HttpMethodBase.java:1096)
at
org.apache.commons.httpclient.HttpMethodDirector.executeWithRetry(HttpMethodDirector.java:398)
at
org.apache.commons.httpclient.HttpMethodDirector.executeMethod(HttpMethodDirector.java:171)
at
org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:397)
at
org.apache.commons.httpclient.HttpClient.executeMethod(HttpClient.java:323)
at
org.apache.commons.httpclient.params.TestSSLTunnelParams.testTunnellingParamsHostHTTP10AndMethodHTTP11(TestSSLTunnelParams.java:182)
Caused by: java.io.EOFException: SSL peer shut down incorrectly
at
java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:167)
at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:108)
at
java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1152)
... 41 more
...
--- End Message ---
--- Begin Message ---
Source: commons-httpclient
Source-Version: 3.1-15
We believe that the bug you reported is fixed in the latest version of
commons-httpclient, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 912...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Emmanuel Bourg <ebo...@apache.org> (supplier of updated commons-httpclient
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 29 Oct 2018 22:56:50 +0100
Source: commons-httpclient
Binary: libcommons-httpclient-java libcommons-httpclient-java-doc
Architecture: source
Version: 3.1-15
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers
<pkg-java-maintain...@lists.alioth.debian.org>
Changed-By: Emmanuel Bourg <ebo...@apache.org>
Description:
libcommons-httpclient-java - Commons HTTPClient - Java library for creating
HTTP clients
libcommons-httpclient-java-doc - Documentation for libcommons-httpclient-java
Closes: 889358 912234
Changes:
commons-httpclient (3.1-15) unstable; urgency=medium
.
* Ignore the test failures with Java 11 (Closes: #912234)
* Standards-Version updated to 4.2.1
* Use salsa.debian.org Vcs-* URLs
* Removed Damien Raude-Morvan from the uploaders (Closes: #889358)
Checksums-Sha1:
4cd0211e60f8aeb0ce83155066ab96dabcdf0966 2346 commons-httpclient_3.1-15.dsc
851046096f61d633eaebb2e73659c3c47a131f68 12796
commons-httpclient_3.1-15.debian.tar.xz
f80af2ba4b48b6bed20bcc55ab0b5cc7b8c35be6 17047
commons-httpclient_3.1-15_source.buildinfo
Checksums-Sha256:
76cb1db7d575bdd9bd50d729150bf412970a1916a41f36f4e03cae1b9fb78386 2346
commons-httpclient_3.1-15.dsc
3c36afc0ff11c65ea073c7d20ad725fab6adf0304bee048f98b537c36cd2dcba 12796
commons-httpclient_3.1-15.debian.tar.xz
33194ceffcaa9fba3011e3f7b5f54e6e8fdd65e90506c0ad452e011d61b41d65 17047
commons-httpclient_3.1-15_source.buildinfo
Files:
019a2aa8c77fa2d088cc29df21063c3d 2346 java optional
commons-httpclient_3.1-15.dsc
a331e31d06a52f2b6ca48e4c75389a6e 12796 java optional
commons-httpclient_3.1-15.debian.tar.xz
80389d7fd40b74722d04a87561db64f6 17047 java optional
commons-httpclient_3.1-15_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=xiRC
-----END PGP SIGNATURE-----
--- End Message ---