Your message dated Sat, 19 Feb 2022 17:33:46 +0000
with message-id <e1nltca-0004bi...@fasolo.debian.org>
and subject line Bug#1005890: fixed in gsocket 1.4.33-2
has caused the Debian Bug report #1005890,
regarding gsocket: flaky autopkgtest
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1005890: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1005890
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: gsocket
Version: 1.4.33-1
Severity: serious
X-Debbugs-CC: debian...@lists.debian.org
User: debian...@lists.debian.org
Usertags: flaky

Dear maintainer(s),

I looked at the results of the autopkgtest of you package on armhf because it was showing up as a regression for the upload of glibc. I noticed that the test regularly fails on all architectures.

Because the unstable-to-testing migration software now blocks on
regressions in testing, flaky tests, i.e. tests that flip between
passing and failing without changes to the list of installed packages,
are causing people unrelated to your package to spend time on these
tests.

Don't hesitate to reach out if you need help and some more information
from our infrastructure.

Paul

https://ci.debian.net/data/autopkgtest/testing/armhf/g/gsocket/19250005/log.gz

autopkgtest [07:10:23]: test upstream-tests: [-----------------------
Running: netcat #6.1 (stdin, 1MB).........................[FAILED]-1
autopkgtest [07:10:25]: test upstream-tests: -----------------------]

Attachment: OpenPGP_signature
Description: OpenPGP digital signature


--- End Message ---
--- Begin Message ---
Source: gsocket
Source-Version: 1.4.33-2
Done: Daniel Echeverri <epsi...@debian.org>

We believe that the bug you reported is fixed in the latest version of
gsocket, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1005...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Daniel Echeverri <epsi...@debian.org> (supplier of updated gsocket package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 19 Feb 2022 11:18:52 -0500
Source: gsocket
Architecture: source
Version: 1.4.33-2
Distribution: unstable
Urgency: medium
Maintainer: Daniel Echeverri <epsi...@debian.org>
Changed-By: Daniel Echeverri <epsi...@debian.org>
Closes: 1005890
Changes:
 gsocket (1.4.33-2) unstable; urgency=medium
 .
   * Mark test 6.1 as flaky test. (Closes: #1005890)
   * Fix typo in d/upstream/metadata file.
Checksums-Sha1:
 9d3900ea224c6d82a3914710c73205eb80aff8f4 1989 gsocket_1.4.33-2.dsc
 cd1b5fe9255dbc3b9e27a6a455d5cfd6a35569d9 4004 gsocket_1.4.33-2.debian.tar.xz
 f29ff877b07fc31b250c02d63af3b1e6972fe332 6153 gsocket_1.4.33-2_amd64.buildinfo
Checksums-Sha256:
 cf3d01a04e03833cd6949975b5eaa41afb0aa1a7e9a19c2690f66ac7065c87cc 1989 
gsocket_1.4.33-2.dsc
 681d85e008f319ed755aa77d9f786f7e08182f5cdbabda4e202ff1d5e11d15f3 4004 
gsocket_1.4.33-2.debian.tar.xz
 4a7a1b4fdc9739b6eec8d854a515536dc97d7fa028e8a00753207528784cef5d 6153 
gsocket_1.4.33-2_amd64.buildinfo
Files:
 d971a0b41e5f7ec0c0bd6044203e267f 1989 net optional gsocket_1.4.33-2.dsc
 5d934db4a6314405313ddb7bd2db235a 4004 net optional 
gsocket_1.4.33-2.debian.tar.xz
 7c5f8cd41cadcaba2ddcd2f54a2cdf52 6153 net optional 
gsocket_1.4.33-2_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=b9HI
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to