Your message dated Tue, 31 May 2022 08:35:45 +0000
with message-id <e1nvxlt-000g8w...@fasolo.debian.org>
and subject line Bug#1011703: fixed in barbican 1:14.0.0-2
has caused the Debian Bug report #1011703,
regarding barbican: FTBFS: ValueError: string argument should contain only 
ASCII characters
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1011703: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011703
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: barbican
Version: 1:14.0.0-1
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-20220525 ftbfs-bookworm

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.


Relevant part (hopefully):
> ======================================================================
> FAIL: 
> barbican.tests.common.test_validators.WhenTestingSimpleCMCOrderValidator.test_should_raise_with_unsigned_pkcs10_data
> barbican.tests.common.test_validators.WhenTestingSimpleCMCOrderValidator.test_should_raise_with_unsigned_pkcs10_data
> ----------------------------------------------------------------------
> testtools.testresult.real._StringException: Traceback (most recent call last):
>   File "/<<PKGBUILDDIR>>/barbican/tests/common/test_validators.py", line 
> 1435, in test_should_raise_with_unsigned_pkcs10_data
>     certs.create_csr_that_has_not_been_signed())
>   File "/<<PKGBUILDDIR>>/barbican/tests/certificate_utils.py", line 53, in 
> create_csr_that_has_not_been_signed
>     pem = crypto.dump_certificate_request(crypto.FILETYPE_PEM, csr)
>   File "/usr/lib/python3/dist-packages/OpenSSL/crypto.py", line 2969, in 
> dump_certificate_request
>     _openssl_assert(result_code != 0)
>   File "/usr/lib/python3/dist-packages/OpenSSL/_util.py", line 71, in 
> openssl_assert
>     exception_from_error_queue(error)
>   File "/usr/lib/python3/dist-packages/OpenSSL/_util.py", line 57, in 
> exception_from_error_queue
>     raise exception_type(errors)
> OpenSSL.crypto.Error: [('asn1 encoding routines', '', 'illegal zero 
> content'), ('PEM routines', '', 'ASN1 lib')]
> 
> 
> ----------------------------------------------------------------------
> Ran 1488 tests in 54.242s
> 
> FAILED (failures=1, skipped=56)
> + echo ======> STESTR TEST SUITE FAILED FOR python3.9: displaying pip3 freeze 
> output...
> ======> STESTR TEST SUITE FAILED FOR python3.9: displaying pip3 freeze 
> output...
> + [ -x /usr/bin/pip3 ]
> + pip3 freeze
> alabaster==0.7.12
> alembic==1.7.6.dev0
> amqp==5.1.0
> anyjson==0.3.3
> appdirs==1.4.4
> attrs==21.2.0
> autopage==0.4.0
> Babel==2.8.0
> bandit==1.6.2
> barbican==14.0.0
> bcrypt==3.2.0
> beautifulsoup4==4.11.1
> blinker==1.4
> blockdiag==2.0.1
> cachetools==5.0.0
> cairocffi==1.3.0
> CairoSVG==2.5.2
> castellan==3.10.2
> cbor2==5.4.2
> certifi==2020.6.20
> cffi==1.15.0
> chardet==4.0.0
> charset-normalizer==2.0.6
> cliff==3.10.1
> cmd2==0.0.0
> colorama==0.4.4
> confluent-kafka==1.7.0
> coverage==6.2
> cryptography==3.4.8
> cssselect2==0.5.0
> ddt==1.4.4
> debtcollector==2.5.0
> decorator==4.4.2
> defusedxml==0.7.1
> deprecation==2.0.7
> dnspython==2.2.1
> docutils==0.17.1
> dogpile.cache==1.1.5
> dulwich==0.20.35
> eventlet==0.30.2
> extras==1.0.0
> falcon==3.0.1
> fasteners==0.17.3
> fixtures==3.0.0
> flake8==4.0.1
> funcparserlib==0.3.6
> future==0.18.2
> futurist==2.4.0
> gabbi==2.4.0
> gevent==21.8.0
> gitdb==4.0.9
> GitPython==3.1.27
> greenlet==1.1.2
> hacking==4.1.0
> httplib2==0.20.2
> idna==3.3
> imagesize==1.3.0
> importlib-metadata==4.6.4
> iniconfig==1.1.1
> iso8601==1.0.2
> jeepney==0.8.0
> Jinja2==3.0.3
> jmespath==1.0.0
> jsonpatch==1.32
> jsonpath-rw==1.4.0
> jsonpath-rw-ext==1.2.2
> jsonpointer==2.2
> jsonschema==3.2.0
> keyring==23.5.0
> keystoneauth1==4.5.0
> keystonemiddleware==9.4.0
> kombu==5.2.4
> ldap3==2.8.1
> logutils==0.3.3
> lxml==4.8.0
> Mako==1.1.3
> MarkupSafe==2.0.1
> mccabe==0.6.1
> monotonic==1.6
> more-itertools==8.10.0
> msgpack==1.0.3
> munch==2.5.0
> netaddr==0.8.0
> netifaces==0.11.0
> oauthlib==3.2.0
> openstackdocstheme==1.20.0
> openstacksdk==0.61.0
> os-api-ref==2.1.0
> os-client-config==2.1.0
> os-service-types==1.7.0
> os-testr==2.0.1
> oslo.cache==2.10.1
> oslo.concurrency==4.5.0
> oslo.config==8.8.0
> oslo.context==4.1.0
> oslo.db==11.2.0
> oslo.i18n==5.1.0
> oslo.log==4.7.0
> oslo.messaging==12.13.0
> oslo.metrics==0.4.0
> oslo.middleware==4.5.1
> oslo.policy==3.11.0
> oslo.serialization==4.3.0
> oslo.service==2.8.0
> oslo.upgradecheck==1.5.0
> oslo.utils==4.12.3
> oslo.versionedobjects==2.6.0
> oslosphinx==4.18.0
> oslotest==4.5.0
> packaging==21.3
> paramiko==2.10.4
> Paste==3.5.0
> PasteDeploy==2.1.1
> pbr==5.8.1
> pecan==1.4.1
> pep8==1.7.1
> Pillow==9.1.0
> pluggy==1.0.0
> ply==3.11
> prettytable==2.5.0
> prometheus-client==0.9.0
> psycopg2==2.9.2
> py==1.10.0
> pyasn1==0.4.8
> pycadf==3.1.1
> pycodestyle==2.8.0
> pycparser==2.21
> pyflakes==2.4.0
> Pygments==2.11.2
> pyinotify==0.9.6
> PyJWT==2.3.0
> PyKMIP==0.10.0
> PyMySQL==1.0.2
> PyNaCl==1.5.0
> pyOpenSSL==21.0.0
> pyparsing==3.0.7
> pyperclip==1.8.2
> pyrsistent==0.18.1
> pytest==6.2.5
> python-barbicanclient==5.3.0
> python-binary-memcached==0.31.1
> python-dateutil==2.8.1
> python-keystoneclient==4.4.0
> python-memcached==1.58
> python-mimeparse==1.6.0
> python-rapidjson==1.4
> python-subunit==1.4.0
> python-swiftclient==3.13.1
> pytz==2022.1
> PyYAML==5.4.1
> pyzmq==22.3.0
> reportlab==3.6.8
> repoze.lru==0.7
> requests==2.27.1
> requestsexceptions==1.4.0
> rfc3986==1.5.0
> roman==3.3
> Routes==2.5.1
> SecretStorage==3.3.2
> simplegeneric==0.8.1
> six==1.16.0
> smmap==5.0.0
> snowballstemmer==2.2.0
> soupsieve==2.3.2
> Sphinx==4.5.0
> sphinxcontrib-blockdiag==2.0.0
> sphinxcontrib-httpdomain==1.8.0
> sphinxcontrib-svg2pdfconverter==1.2.0
> SQLAlchemy==1.4.31
> sqlalchemy-migrate==0.13.0
> sqlparse==0.4.2
> statsd==3.3.0
> stestr==3.2.1
> stevedore==3.5.0
> tempest==30.1.0
> Tempita==0.5.2
> tenacity==8.0.1
> testrepository==0.0.20
> testresources==2.0.1
> testscenarios==0.5.0
> testtools==2.5.0
> tinycss2==1.1.1
> toml==0.10.2
> uhashring==2.1
> unittest2==1.1.0
> urllib3==1.26.9
> vine==5.0.0
> voluptuous==0.12.2
> waitress==2.1.1
> wcwidth==0.2.5
> webcolors==1.11.1
> webencodings==0.5.1
> WebOb==1.8.6
> WebTest==2.0.35
> wrapt==1.13.3
> wsgi-intercept==1.9.3
> xcffib==0.11.1
> yappi==1.3.3
> zipp==1.0.0
> zope.event==4.4
> zope.interface==5.4.0
> + exit 1
> make[1]: *** [debian/rules:31: override_dh_install] Error 1


The full build log is available from:
http://qa-logs.debian.net/2022/05/25/barbican_14.0.0-1_unstable.log

All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20220525;users=lu...@debian.org
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20220525&fusertaguser=lu...@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

If you reassign this bug to another package, please marking it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.

--- End Message ---
--- Begin Message ---
Source: barbican
Source-Version: 1:14.0.0-2
Done: Thomas Goirand <z...@debian.org>

We believe that the bug you reported is fixed in the latest version of
barbican, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1011...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Goirand <z...@debian.org> (supplier of updated barbican package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 31 May 2022 09:52:24 +0200
Source: barbican
Architecture: source
Version: 1:14.0.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenStack <team+openst...@tracker.debian.org>
Changed-By: Thomas Goirand <z...@debian.org>
Closes: 1011703
Changes:
 barbican (1:14.0.0-2) unstable; urgency=medium
 .
   * Blacklist test_should_raise_with_unsigned_pkcs10_data() (Closes: #1011703).
Checksums-Sha1:
 e3a757fd6c0ac890b760794215d83b3125646e82 3660 barbican_14.0.0-2.dsc
 e38ca9201dd21f34fbe8e2f1abacf9a7c77cf9b0 10020 barbican_14.0.0-2.debian.tar.xz
 ebb8891d40682122f71c34a42d6cedb5f46d44a7 21645 
barbican_14.0.0-2_amd64.buildinfo
Checksums-Sha256:
 72443f1c19f8a010f1acf3c527530decdff1592f88055c8c4b0b5fda340b29db 3660 
barbican_14.0.0-2.dsc
 5422286f16dcbd2746eed03a63c708ba2085a5ea34241a0483ff971a9559df46 10020 
barbican_14.0.0-2.debian.tar.xz
 29a57cc41c960a823f7db98b1a90b1cb1a6e990819f53f538eaae3a0444e34af 21645 
barbican_14.0.0-2_amd64.buildinfo
Files:
 f72de76cb2b54eb369691a3732223314 3660 net optional barbican_14.0.0-2.dsc
 f8241300a792784516a79e12c9e1aa32 10020 net optional 
barbican_14.0.0-2.debian.tar.xz
 f4a1c7e6a0d6e40d7ad7c197f24946a9 21645 net optional 
barbican_14.0.0-2_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=1ZQY
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to