Control: tag -1 + confirmed upstream

On Tue, 20 Dec 2022 18:28:48 +0100, Lucas Nussbaum wrote:

> Source: libhttp-daemon-ssl-perl
> Version: 1.05-01-3
> Severity: serious
> Justification: FTBFS
> Tags: bookworm sid ftbfs
> User: lu...@debian.org
> Usertags: ftbfs-20221220 ftbfs-bookworm
> 

> > t/testmodule.t .. 
> > 1..14
> > ok #authority certificate generated 1
> > ok #server certificate generated 2
> > ok #authority certificate saved 3
> > ok #server certificate saved 4
> > ok #server key saved 5
> > ok #server init port=37009 6
> > ok #server fileno 7
> > ok #server url test 8
> > ok #bad request handled 9
> > ok #client bad connection test 7
> > not ok #client failure
> > not ok 9 # valid request did not return a socket
> > Dubious, test returned 255 (wstat 65280, 0xff00)
> > Failed 4/14 subtests 

I believe this is fallout from the upgrade of libio-socket-ssl-perl
from 2.077-1 to 2.078-1 (the tests pass in testing).
libio-socket-ssl-perl's upstream changelog says

2.078 2022/12/11
- revert decision from 2014 to not verify hostname by default if hostname is
  IP address but no explicit verification scheme given
  https://github.com/noxxi/p5-io-socket-ssl/issues/121


So I guess we need to do something about the created certs for this
test …


Cheers,
gregor

-- 
 .''`.  https://info.comodo.priv.at -- Debian Developer https://www.debian.org
 : :' : OpenPGP fingerprint D1E1 316E 93A7 60A8 104D  85FA BB3A 6801 8649 AA06
 `. `'  Member VIBE!AT & SPI Inc. -- Supporter Free Software Foundation Europe
   `-   

Attachment: signature.asc
Description: Digital Signature

Reply via email to