Control: tag -1 + confirmed upstream On Tue, 20 Dec 2022 18:28:48 +0100, Lucas Nussbaum wrote:
> Source: libhttp-daemon-ssl-perl > Version: 1.05-01-3 > Severity: serious > Justification: FTBFS > Tags: bookworm sid ftbfs > User: lu...@debian.org > Usertags: ftbfs-20221220 ftbfs-bookworm > > > t/testmodule.t .. > > 1..14 > > ok #authority certificate generated 1 > > ok #server certificate generated 2 > > ok #authority certificate saved 3 > > ok #server certificate saved 4 > > ok #server key saved 5 > > ok #server init port=37009 6 > > ok #server fileno 7 > > ok #server url test 8 > > ok #bad request handled 9 > > ok #client bad connection test 7 > > not ok #client failure > > not ok 9 # valid request did not return a socket > > Dubious, test returned 255 (wstat 65280, 0xff00) > > Failed 4/14 subtests I believe this is fallout from the upgrade of libio-socket-ssl-perl from 2.077-1 to 2.078-1 (the tests pass in testing). libio-socket-ssl-perl's upstream changelog says 2.078 2022/12/11 - revert decision from 2014 to not verify hostname by default if hostname is IP address but no explicit verification scheme given https://github.com/noxxi/p5-io-socket-ssl/issues/121 So I guess we need to do something about the created certs for this test … Cheers, gregor -- .''`. https://info.comodo.priv.at -- Debian Developer https://www.debian.org : :' : OpenPGP fingerprint D1E1 316E 93A7 60A8 104D 85FA BB3A 6801 8649 AA06 `. `' Member VIBE!AT & SPI Inc. -- Supporter Free Software Foundation Europe `-
signature.asc
Description: Digital Signature