Your message dated Thu, 03 Dec 2020 13:33:34 +0000
with message-id <e1kkojm-000dw5...@fasolo.debian.org>
and subject line Bug#975212: fixed in jss 4.8.0-2
has caused the Debian Bug report #975212,
regarding jss: FTBFS: test failed
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
975212: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=975212
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: jss
Version: 4.8.0-1
Severity: serious
Justification: FTBFS on amd64
Tags: bullseye sid ftbfs
Usertags: ftbfs-20201119 ftbfs-bullseye
Hi,
During a rebuild of all packages in sid, your package failed to build
on amd64.
Relevant part (hopefully):
> make[1]: Entering directory '/<<PKGBUILDDIR>>'
> cd build && ctest --output-on-failure
> Test project /<<PKGBUILDDIR>>/build
> Start 1: Clean_Data_Dir
> 1/75 Test #1: Clean_Data_Dir .................................... Passed
> 0.01 sec
> Start 2: Create_Data_Dir
> 2/75 Test #2: Create_Data_Dir ................................... Passed
> 0.01 sec
> Start 3: Clean_Setup_DBs
> 3/75 Test #3: Clean_Setup_DBs ................................... Passed
> 0.01 sec
> Start 4: Create_Setup_DBs
> 4/75 Test #4: Create_Setup_DBs .................................. Passed
> 0.01 sec
> Start 5: Setup_DBs
> 5/75 Test #5: Setup_DBs ......................................... Passed
> 0.24 sec
> Start 6: Clean_FIPS_Setup_DBs
> 6/75 Test #6: Clean_FIPS_Setup_DBs .............................. Passed
> 0.01 sec
> Start 7: Create_FIPS_Setup_DBs
> 7/75 Test #7: Create_FIPS_Setup_DBs ............................. Passed
> 0.01 sec
> Start 8: Setup_FIPS_DBs
> 8/75 Test #8: Setup_FIPS_DBs .................................... Passed
> 0.22 sec
> Start 9: TestBufferPRFD
> 9/75 Test #9: TestBufferPRFD .................................... Passed
> 0.00 sec
> Start 10: Test_UTF-8_Converter
> 10/75 Test #10: Test_UTF-8_Converter .............................. Passed
> 0.07 sec
> Start 11: Test_Base64_Parsing
> 11/75 Test #11: Test_Base64_Parsing ............................... Passed
> 0.05 sec
> Start 12: JSS_DER_Encoding_of_Enumeration_regression_test
> 12/75 Test #12: JSS_DER_Encoding_of_Enumeration_regression_test ... Passed
> 1.97 sec
> Start 13: JSS_Test_DER_Encoding_Functionality
> 13/75 Test #13: JSS_Test_DER_Encoding_Functionality ............... Passed
> 0.05 sec
> Start 14: JSS_Test_Empty_DER_Value
> 14/75 Test #14: JSS_Test_Empty_DER_Value .......................... Passed
> 0.05 sec
> Start 15: BigObjectIdentifier
> 15/75 Test #15: BigObjectIdentifier ............................... Passed
> 0.06 sec
> Start 16: JSS_Test_PR_FileDesc
> 16/75 Test #16: JSS_Test_PR_FileDesc .............................. Passed
> 0.12 sec
> Start 17: JSS_Test_Raw_SSL
> 17/75 Test #17: JSS_Test_Raw_SSL .................................. Passed
> 0.13 sec
> Start 18: JSS_Test_Buffer
> 18/75 Test #18: JSS_Test_Buffer ................................... Passed
> 0.11 sec
> Start 19: JSS_Test_GlobalRefProxy
> 19/75 Test #19: JSS_Test_GlobalRefProxy ........................... Passed
> 5.13 sec
> Start 20: JUnit_BMPStringTest
> 20/75 Test #20: JUnit_BMPStringTest ............................... Passed
> 0.37 sec
> Start 21: JUnit_IA5StringTest
> 21/75 Test #21: JUnit_IA5StringTest ............................... Passed
> 0.26 sec
> Start 22: JUnit_PrintableStringTest
> 22/75 Test #22: JUnit_PrintableStringTest ......................... Passed
> 0.29 sec
> Start 23: JUnit_TeletexStringTest
> 23/75 Test #23: JUnit_TeletexStringTest ........................... Passed
> 0.29 sec
> Start 24: JUnit_UniversalStringTest
> 24/75 Test #24: JUnit_UniversalStringTest ......................... Passed
> 0.40 sec
> Start 25: JUnit_UTF8StringTest
> 25/75 Test #25: JUnit_UTF8StringTest .............................. Passed
> 0.33 sec
> Start 26: buffer_size_1
> 26/75 Test #26: buffer_size_1 ..................................... Passed
> 0.00 sec
> Start 27: buffer_size_4
> 27/75 Test #27: buffer_size_4 ..................................... Passed
> 0.00 sec
> Start 28: JUnit_CertificateChainTest
> 28/75 Test #28: JUnit_CertificateChainTest ........................ Passed
> 0.34 sec
> Start 29: JUnit_ChainSortingTest
> 29/75 Test #29: JUnit_ChainSortingTest ............................ Passed
> 0.35 sec
> Start 30: Generate_known_RSA_cert_pair
> 30/75 Test #30: Generate_known_RSA_cert_pair ...................... Passed
> 5.73 sec
> Start 31: Generate_known_ECDSA_cert_pair
> 31/75 Test #31: Generate_known_ECDSA_cert_pair .................... Passed
> 0.73 sec
> Start 32: Create_PKCS11_cert_to_PKCS12_rsa.pfx
> 32/75 Test #32: Create_PKCS11_cert_to_PKCS12_rsa.pfx .............. Passed
> 1.44 sec
> Start 33: Create_PKCS11_cert_to_PKCS12_ecdsa.pfx
> 33/75 Test #33: Create_PKCS11_cert_to_PKCS12_ecdsa.pfx ............ Passed
> 1.21 sec
> Start 34: List_CA_certs
> 34/75 Test #34: List_CA_certs ..................................... Passed
> 0.20 sec
> Start 35: SSLClientAuth
> 35/75 Test #35: SSLClientAuth ..................................... Passed
> 6.47 sec
> Start 36: Key_Generation
> 36/75 Test #36: Key_Generation .................................... Passed
> 1.87 sec
> Start 37: Digest
> 37/75 Test #37: Digest ............................................ Passed
> 0.21 sec
> Start 38: HMAC
> 38/75 Test #38: HMAC .............................................. Passed
> 0.22 sec
> Start 39: KeyWrapping
> 39/75 Test #39: KeyWrapping ....................................... Passed
> 1.80 sec
> Start 40: Mozilla_JSS_JCA_Signature
> 40/75 Test #40: Mozilla_JSS_JCA_Signature .........................***Failed
> 0.88 sec
> ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be
> preloaded (cannot open shared object file): ignored.
> Nov 19, 2020 7:29:38 AM org.mozilla.jss.CryptoManager initialize
> INFO: JSS CryptoManager: successfully initialized from NSS database at
> /<<PKGBUILDDIR>>/build/results/nssdb
> Provider 0: Mozilla-JSS
> Provider 1: SUN
> Provider 2: SunRsaSign
> Provider 3: SunJSSE
> Provider 4: SunJCE
> Provider 5: JdkSASL
> Provider 6: SunPKCS11
> ***FilePasswordCallback returns m1oZilla
> The provider used to Generate the Keys was Mozilla-JSS
> provider info Provides Signature, Message Digesting, and RNG
> Created a signing context
> The provider used for the signer Mozilla-JSS and the algorithm was MD5/RSA
> Exception in thread "main" java.security.InvalidKeyException: Token exception
> occurred: Unable to create signing context
> at
> org.mozilla.jss.provider.java.security.JSSSignatureSpi.engineInitSign(JSSSignatureSpi.java:57)
> at
> java.base/java.security.Signature$Delegate.engineInitSign(Signature.java:1351)
> at java.base/java.security.Signature.initSign(Signature.java:636)
> at org.mozilla.jss.tests.JCASigTest.sigTest(JCASigTest.java:50)
> at org.mozilla.jss.tests.JCASigTest.main(JCASigTest.java:104)
> Caused by: org.mozilla.jss.crypto.TokenException: Unable to create signing
> context
> at org.mozilla.jss.pkcs11.PK11Signature.initSigContext(Native Method)
> at
> org.mozilla.jss.pkcs11.PK11Signature.engineInitSign(PK11Signature.java:114)
> at org.mozilla.jss.crypto.Signature.initSign(Signature.java:55)
> at
> org.mozilla.jss.provider.java.security.JSSSignatureSpi.engineInitSign(JSSSignatureSpi.java:53)
> ... 4 more
>
> Start 41: Mozilla_JSS_NSS_Signature
> 41/75 Test #41: Mozilla_JSS_NSS_Signature .........................***Failed
> 0.88 sec
> ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be
> preloaded (cannot open shared object file): ignored.
> Nov 19, 2020 7:29:39 AM org.mozilla.jss.CryptoManager initialize
> INFO: JSS CryptoManager: successfully initialized from NSS database at
> /<<PKGBUILDDIR>>/build/results/nssdb
> Available tokens:
> token : NSS Generic Crypto Services
> token : Internal Key Storage Token
> ***FilePasswordCallback returns m1oZilla
> Created a signing context
> Exception in thread "main" org.mozilla.jss.crypto.TokenException: Unable to
> create signing context
> at org.mozilla.jss.pkcs11.PK11Signature.initSigContext(Native Method)
> at
> org.mozilla.jss.pkcs11.PK11Signature.engineInitSign(PK11Signature.java:114)
> at org.mozilla.jss.crypto.Signature.initSign(Signature.java:55)
> at org.mozilla.jss.tests.SigTest.main(SigTest.java:88)
>
> Start 42: JSS_Signature_test
> 42/75 Test #42: JSS_Signature_test ................................***Failed
> 0.88 sec
> ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be
> preloaded (cannot open shared object file): ignored.
> Nov 19, 2020 7:29:40 AM org.mozilla.jss.CryptoManager initialize
> INFO: JSS CryptoManager: successfully initialized from NSS database at
> /<<PKGBUILDDIR>>/build/results/nssdb
> Available tokens:
> token : NSS Generic Crypto Services
> token : Internal Key Storage Token
> ***FilePasswordCallback returns m1oZilla
> Created a signing context
> Exception in thread "main" org.mozilla.jss.crypto.TokenException: Unable to
> create signing context
> at org.mozilla.jss.pkcs11.PK11Signature.initSigContext(Native Method)
> at
> org.mozilla.jss.pkcs11.PK11Signature.engineInitSign(PK11Signature.java:114)
> at org.mozilla.jss.crypto.Signature.initSign(Signature.java:55)
> at org.mozilla.jss.tests.SigTest.main(SigTest.java:88)
>
> Start 43: Secret_Decoder_Ring
> 43/75 Test #43: Secret_Decoder_Ring ............................... Passed
> 0.34 sec
> Start 44: List_cert_by_certnick
> 44/75 Test #44: List_cert_by_certnick ............................. Passed
> 0.28 sec
> Start 45: Verify_cert_by_certnick
> 45/75 Test #45: Verify_cert_by_certnick ........................... Passed
> 0.21 sec
> Start 46: Secret_Key_Generation
> 46/75 Test #46: Secret_Key_Generation ............................. Passed
> 0.20 sec
> Start 47: Symmetric_Key_Deriving
> 47/75 Test #47: Symmetric_Key_Deriving ............................ Passed
> 0.19 sec
> Start 48: X509CertTest
> 48/75 Test #48: X509CertTest ...................................... Passed
> 3.69 sec
> Start 49: KeyStoreTest
> 49/75 Test #49: KeyStoreTest ...................................... Passed
> 0.50 sec
> Start 50: JSSProvider
> 50/75 Test #50: JSSProvider ....................................... Passed
> 0.26 sec
> Start 51: SSLEngine_RSA
> 51/75 Test #51: SSLEngine_RSA ..................................... Passed
> 30.34 sec
> Start 52: SSLEngine_ECDSA
> 52/75 Test #52: SSLEngine_ECDSA ................................... Passed
> 2.31 sec
> Start 53: Key_Factory
> 53/75 Test #53: Key_Factory ....................................... Passed
> 0.35 sec
> Start 54: HMAC_Unwrap
> 54/75 Test #54: HMAC_Unwrap ....................................... Passed
> 0.21 sec
> Start 55: CMAC_Test
> 55/75 Test #55: CMAC_Test ......................................... Passed
> 0.21 sec
> Start 56: KBKDF_Test
> 56/75 Test #56: KBKDF_Test ........................................ Passed
> 0.22 sec
> Start 57: Mozilla_JSS_Secret_Key_Generation
> 57/75 Test #57: Mozilla_JSS_Secret_Key_Generation ................. Passed
> 0.27 sec
> Start 58: TestBufferPRFDSSL_RSA
> 58/75 Test #58: TestBufferPRFDSSL_RSA ............................. Passed
> 0.18 sec
> Start 59: TestBufferPRFDSSL_ECDSA
> 59/75 Test #59: TestBufferPRFDSSL_ECDSA ........................... Passed
> 0.04 sec
> Start 60: JSS_Test_BufferPRFD
> 60/75 Test #60: JSS_Test_BufferPRFD ............................... Passed
> 1.28 sec
> Start 61: Generate_FIPS_known_RSA_cert_pair
> 61/75 Test #61: Generate_FIPS_known_RSA_cert_pair ................. Passed
> 5.07 sec
> Start 62: Generate_FIPS_known_ECDSA_cert_pair
> 62/75 Test #62: Generate_FIPS_known_ECDSA_cert_pair ............... Passed
> 0.74 sec
> Start 63: Enable_FipsMODE
> 63/75 Test #63: Enable_FipsMODE ................................... Passed
> 0.24 sec
> Start 64: check_FipsMODE
> 64/75 Test #64: check_FipsMODE .................................... Passed
> 0.20 sec
> Start 65: SSLClientAuth_FIPSMODE
> 65/75 Test #65: SSLClientAuth_FIPSMODE ............................ Passed
> 6.33 sec
> Start 66: HMAC_FIPSMODE
> 66/75 Test #66: HMAC_FIPSMODE ..................................... Passed
> 0.27 sec
> Start 67: KeyWrapping_FIPSMODE
> 67/75 Test #67: KeyWrapping_FIPSMODE .............................. Passed
> 1.65 sec
> Start 68: Mozilla_JSS_JCA_Signature_FIPSMODE
> 68/75 Test #68: Mozilla_JSS_JCA_Signature_FIPSMODE ................***Failed
> 0.92 sec
> ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be
> preloaded (cannot open shared object file): ignored.
> Nov 19, 2020 7:30:37 AM org.mozilla.jss.CryptoManager initialize
> INFO: JSS CryptoManager: successfully initialized from NSS database at
> /<<PKGBUILDDIR>>/build/results/fips
> Provider 0: Mozilla-JSS
> Provider 1: SUN
> Provider 2: SunRsaSign
> Provider 3: SunJSSE
> Provider 4: SunJCE
> Provider 5: JdkSASL
> Provider 6: SunPKCS11
> ***FilePasswordCallback returns m1oZilla
> The provider used to Generate the Keys was Mozilla-JSS
> provider info Provides Signature, Message Digesting, and RNG
> Created a signing context
> The provider used for the signer Mozilla-JSS and the algorithm was MD5/RSA
> Exception in thread "main" java.security.InvalidKeyException: Token exception
> occurred: Unable to create signing context
> at
> org.mozilla.jss.provider.java.security.JSSSignatureSpi.engineInitSign(JSSSignatureSpi.java:57)
> at
> java.base/java.security.Signature$Delegate.engineInitSign(Signature.java:1351)
> at java.base/java.security.Signature.initSign(Signature.java:636)
> at org.mozilla.jss.tests.JCASigTest.sigTest(JCASigTest.java:50)
> at org.mozilla.jss.tests.JCASigTest.main(JCASigTest.java:104)
> Caused by: org.mozilla.jss.crypto.TokenException: Unable to create signing
> context
> at org.mozilla.jss.pkcs11.PK11Signature.initSigContext(Native Method)
> at
> org.mozilla.jss.pkcs11.PK11Signature.engineInitSign(PK11Signature.java:114)
> at org.mozilla.jss.crypto.Signature.initSign(Signature.java:55)
> at
> org.mozilla.jss.provider.java.security.JSSSignatureSpi.engineInitSign(JSSSignatureSpi.java:53)
> ... 4 more
>
> Start 69: JSS_Signature_test_FipsMODE
> 69/75 Test #69: JSS_Signature_test_FipsMODE .......................***Failed
> 0.90 sec
> ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be
> preloaded (cannot open shared object file): ignored.
> Nov 19, 2020 7:30:38 AM org.mozilla.jss.CryptoManager initialize
> INFO: JSS CryptoManager: successfully initialized from NSS database at
> /<<PKGBUILDDIR>>/build/results/fips
> Available tokens:
> token : NSS FIPS 140-2 User Private Key
> ***FilePasswordCallback returns m1oZilla
> Created a signing context
> Exception in thread "main" org.mozilla.jss.crypto.TokenException: Unable to
> create signing context
> at org.mozilla.jss.pkcs11.PK11Signature.initSigContext(Native Method)
> at
> org.mozilla.jss.pkcs11.PK11Signature.engineInitSign(PK11Signature.java:114)
> at org.mozilla.jss.crypto.Signature.initSign(Signature.java:55)
> at org.mozilla.jss.tests.SigTest.main(SigTest.java:88)
>
> Start 70: SSLEngine_RSA_FIPSMODE
> 70/75 Test #70: SSLEngine_RSA_FIPSMODE ............................ Passed
> 20.08 sec
> Start 71: SSLEngine_ECDSA_FIPSMODE
> 71/75 Test #71: SSLEngine_ECDSA_FIPSMODE .......................... Passed
> 2.08 sec
> Start 72: Disable_FipsMODE
> 72/75 Test #72: Disable_FipsMODE .................................. Passed
> 0.22 sec
> Start 73: JUnit_GenericValueConverterTest
> 73/75 Test #73: JUnit_GenericValueConverterTest ................... Passed
> 0.17 sec
> Start 74: JUnit_IA5StringConverterTest
> 74/75 Test #74: JUnit_IA5StringConverterTest ...................... Passed
> 0.16 sec
> Start 75: JUnit_PrintableConverterTest
> 75/75 Test #75: JUnit_PrintableConverterTest ...................... Passed
> 0.14 sec
>
> 93% tests passed, 5 tests failed out of 75
>
> Total Test time (real) = 113.67 sec
>
> The following tests FAILED:
> 40 - Mozilla_JSS_JCA_Signature (Failed)
> 41 - Mozilla_JSS_NSS_Signature (Failed)
> 42 - JSS_Signature_test (Failed)
> 68 - Mozilla_JSS_JCA_Signature_FIPSMODE (Failed)
> 69 - JSS_Signature_test_FipsMODE (Failed)
> Errors while running CTest
> make[1]: *** [debian/rules:38: override_dh_auto_test] Error 8
The full build log is available from:
http://qa-logs.debian.net/2020/11/19/jss_4.8.0-1_unstable.log
A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!
About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.
--- End Message ---
--- Begin Message ---
Source: jss
Source-Version: 4.8.0-2
Done: Timo Aaltonen <tjaal...@debian.org>
We believe that the bug you reported is fixed in the latest version of
jss, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 975...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Timo Aaltonen <tjaal...@debian.org> (supplier of updated jss package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 03 Dec 2020 15:08:12 +0200
Source: jss
Architecture: source
Version: 4.8.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian FreeIPA Team <pkg-freeipa-de...@alioth-lists.debian.net>
Changed-By: Timo Aaltonen <tjaal...@debian.org>
Closes: 975212
Changes:
jss (4.8.0-2) unstable; urgency=medium
.
* Disable-use-of-MD4-MD5-and-SHA-1-algorithms.patch: Fix tests with
nss-3.59. (Closes: #975212)
Checksums-Sha1:
4ef51fd54b18d9f29e8bd151709a21ae63203b99 2039 jss_4.8.0-2.dsc
11208e8bcc1327271de4ad5668f210f2220d1522 14076 jss_4.8.0-2.debian.tar.xz
4df17ca6fb41395f433b5bf9de4f96382d234480 7212 jss_4.8.0-2_source.buildinfo
Checksums-Sha256:
f1a5c4663be92fb5d8cbcd4c05d9496decc26273e5378fed5ab3fa29bf08f562 2039
jss_4.8.0-2.dsc
b29148faaee7046e28631852a9e05bd43f1e8d66ee8c1df4460d6150c4dce461 14076
jss_4.8.0-2.debian.tar.xz
cddf2eaeb10f4f642384a3bc6941dd6bf642657fa61e6ca905e0b2d7ca5f9afe 7212
jss_4.8.0-2_source.buildinfo
Files:
a01e90ce90d6400fc7b446f02ade7b3a 2039 java optional jss_4.8.0-2.dsc
322cc5d493d868b108fdb1ad0387dc26 14076 java optional jss_4.8.0-2.debian.tar.xz
a776a942a719395d409e78b136d5d0d8 7212 java optional
jss_4.8.0-2_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=CgQf
-----END PGP SIGNATURE-----
--- End Message ---