Your message dated Thu, 08 Sep 2022 01:33:50 +0000
with message-id <e1ow6qq-006dqn...@fasolo.debian.org>
and subject line Bug#1011676: fixed in ruby-ntlm 0.6.3-2
has caused the Debian Bug report #1011676,
regarding ruby-ntlm: FTBFS: ERROR: Test "ruby3.0" failed: Failure/Error:
OpenSSL::Digest::MD4.digest pwd
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1011676: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011676
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ruby-ntlm
Version: 0.6.3-1
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-20220525 ftbfs-bookworm
Hi,
During a rebuild of all packages in sid, your package failed to build
on amd64.
Relevant part (hopefully):
> Failure/Error: OpenSSL::Digest::MD4.digest pwd
>
> OpenSSL::Digest::DigestError:
> Digest initialization failed: initialization error
> # ./lib/net/ntlm.rb:149:in `ntlm_hash'
> # ./spec/lib/net/ntlm_spec.rb:119:in `block (2 levels) in <top
> (required)>'
>
> Finished in 0.29403 seconds (files took 0.31806 seconds to load)
> 741 examples, 19 failures
>
> Failed examples:
>
> rspec ./spec/lib/net/ntlm/client/session_spec.rb:14 #
> Net::NTLM::Client::Session#sign_message signs a message and when KEY_EXCHANGE
> is true
> rspec ./spec/lib/net/ntlm/client/session_spec.rb:27 #
> Net::NTLM::Client::Session#verify_signature verifies a message signature
> rspec ./spec/lib/net/ntlm/client/session_spec.rb:39 #
> Net::NTLM::Client::Session#seal_message should seal the message
> rspec ./spec/lib/net/ntlm/client/session_spec.rb:47 #
> Net::NTLM::Client::Session#unseal_message should unseal the message
> rspec ./spec/lib/net/ntlm/client/session_spec.rb:55 #
> Net::NTLM::Client::Session#exported_session_key returns a random 16-byte key
> when negotiate_key_exchange? is true
> rspec ./spec/lib/net/ntlm/message/type2_spec.rb:64 #
> Net::NTLM::Message::Type2 should generate a type 3 response
> rspec ./spec/lib/net/ntlm/message/type2_spec.rb:81 #
> Net::NTLM::Message::Type2 should upcase domain when provided
> rspec ./spec/lib/net/ntlm/message/type3_spec.rb:97 #
> Net::NTLM::Message::Type3.parse with NTLMv2 data #blank_password? should be
> true
> rspec ./spec/lib/net/ntlm/message/type3_spec.rb:154 #
> Net::NTLM::Message::Type3.parse NTLM2 Session Response Authentication; NTLM2
> Signing and Sealing Using the 128-bit NTLM2 Session Response User Session Key
> With Key Exchange Negotiated #password? should be true for "test1234"
> rspec ./spec/lib/net/ntlm/message/type3_spec.rb:159 #
> Net::NTLM::Message::Type3.parse NTLM2 Session Response Authentication; NTLM2
> Signing and Sealing Using the 128-bit NTLM2 Session Response User Session Key
> With Key Exchange Negotiated #blank_password? should be false
> rspec ./spec/lib/net/ntlm_spec.rb:36 # Net::NTLM should encrypt the string
> with DES for each key supplied
> rspec ./spec/lib/net/ntlm_spec.rb:42 # Net::NTLM should generate an lm_hash
> rspec ./spec/lib/net/ntlm_spec.rb:46 # Net::NTLM should generate an ntlm_hash
> rspec ./spec/lib/net/ntlm_spec.rb:50 # Net::NTLM should generate an
> ntlmv2_hash
> rspec ./spec/lib/net/ntlm_spec.rb:62 # Net::NTLM should generate an
> lm_response
> rspec ./spec/lib/net/ntlm_spec.rb:71 # Net::NTLM should generate an
> ntlm_response
> rspec ./spec/lib/net/ntlm_spec.rb:81 # Net::NTLM should generate a
> lvm2_response
> rspec ./spec/lib/net/ntlm_spec.rb:91 # Net::NTLM should generate a
> ntlmv2_response
> rspec ./spec/lib/net/ntlm_spec.rb:116 # Net::NTLM should generate a
> ntlm2_session
>
> /usr/bin/ruby3.0
> -I/usr/share/rubygems-integration/all/gems/rspec-support-3.10.3/lib:/usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/lib
> /usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/exe/rspec
> --pattern ./spec/\*\*/\*.rb --format documentation failed
> ERROR: Test "ruby3.0" failed:
The full build log is available from:
http://qa-logs.debian.net/2022/05/25/ruby-ntlm_0.6.3-1_unstable.log
All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20220525;users=lu...@debian.org
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20220525&fusertaguser=lu...@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results
A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!
If you reassign this bug to another package, please marking it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects
If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.
--- End Message ---
--- Begin Message ---
Source: ruby-ntlm
Source-Version: 0.6.3-2
Done: Unit 193 <unit...@debian.org>
We believe that the bug you reported is fixed in the latest version of
ruby-ntlm, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1011...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Unit 193 <unit...@debian.org> (supplier of updated ruby-ntlm package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA384
Format: 1.8
Date: Wed, 07 Sep 2022 21:07:17 -0400
Source: ruby-ntlm
Architecture: source
Version: 0.6.3-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Team
<pkg-ruby-extras-maintain...@lists.alioth.debian.org>
Changed-By: Unit 193 <unit...@debian.org>
Closes: 1011676
Changes:
ruby-ntlm (0.6.3-2) unstable; urgency=medium
.
* Team upload.
* d/p/02_openssl3_compatibility.patch:
- Grab an upstream PR to fix compatibility with openssl 3.0.
(Closes: #1011676)
* Update Standards-Version to 4.6.1.
Checksums-Sha1:
a11e21cc614c1a7cd2ffd130a770880a0fd38e17 1970 ruby-ntlm_0.6.3-2.dsc
48debf3d25c09fb07afbde96ed865bf63f8478bd 28882 ruby-ntlm_0.6.3.orig.tar.gz
2a8a44c00b4dcbf01a58983f1fefce13ff2fa9ed 6472 ruby-ntlm_0.6.3-2.debian.tar.xz
b1ad9759714a5b443e2926fd6d32cde8fd755680 9642 ruby-ntlm_0.6.3-2_amd64.buildinfo
Checksums-Sha256:
a6d778c03c7698ed1b276ccb9c6bb4629e4cc9f16464d8625984160af528aeb3 1970
ruby-ntlm_0.6.3-2.dsc
44f08d71577be90d084e74f5fb56980b3df5140add2b7deb3d8792b37a8f75c0 28882
ruby-ntlm_0.6.3.orig.tar.gz
9c8e360113ac20e8f8a118e66a6f48606072d004ed9b01402750edc83557f3b7 6472
ruby-ntlm_0.6.3-2.debian.tar.xz
373f34f93891bbd5ab7771434f87b73a833c2835776c26c1dabd882ed6b83f72 9642
ruby-ntlm_0.6.3-2_amd64.buildinfo
Files:
83669b3f47a5e4365b1ecba69d0c38f2 1970 ruby optional ruby-ntlm_0.6.3-2.dsc
ba33315550b685ebce692150fce3f782 28882 ruby optional
ruby-ntlm_0.6.3.orig.tar.gz
73e85293df672025ecfffd4129311664 6472 ruby optional
ruby-ntlm_0.6.3-2.debian.tar.xz
302c2fe09915609c6a027536308e87db 9642 ruby optional
ruby-ntlm_0.6.3-2_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCQAdFiEEjbPlhoZdK0orGFpcUAHhsJqjdEsFAmMZQQIACgkQUAHhsJqj
dEuDIhAAyuzSpDATygmZJmsKmWH//r7nRUPZwS8JK4QjQ0JKWHu4gTGdF/NuxacJ
cOnLX1w5qSeIwYiPzcd2Wlu77ielaVdOXFxxsgZg3g2pkos5Vl7t1rYDuRFE15GD
Hf5ixr3JGbaIwMBTkPtSboVgDQC3Zf7CiRjLCxTHnS41pA7+M7nVwtI0YTurrdqY
4u1wXT41hyKJkhE/S/qLHZqAJyDALlwSjnombH2SQR4PNnWncltPAy4vmRHY9RVh
2ipWT/2KGy/zwO8/4Hrr06sIK1paF/tWsP26onscc840e/1tOcBarra7W7FBmjDc
PSTwSsrtgPvMCkZWT9tnQNptZuPCKAOhiNf5ka45EZWWKKVCiFZ/CJE+wT5O1PBH
s1WuM5IiwHrRKqJoJIlRagRkpdSslhvdtTtv/tt8RMrq9PWvzvxFb14eu1yygznl
OhDAJzCu534xK9NNCsZ4vW3TYxwq4VLwkPFlFo8vEw7otG67wG08l3QKkzbHDiBA
TVx5s4zJFqBT0b1L0S3dqnTGnbuRjZ//Gb+4e3bzc6sSsrNz4EC9+2KTLXTuWpKZ
xTmIZFn9uZLRUGdR1skARqNJue69rXhSCd1Y4z9W07qkkVdOEs/HDCBD3hmQXRw8
dYIwcRk2wAcFyoNdJ8tpP1tDviAndTRehmMXbfOwG7nbJlM3mkg=
=A9ia
-----END PGP SIGNATURE-----
--- End Message ---