Control: tags 1102957 + pending Dear maintainer,
I've prepared an NMU for geventhttpclient (versioned as 2.3.3-1.1) and uploaded it to DELAYED/1. Please feel free to tell me if I should cancel it. Regards. Sebastian
diffstat for geventhttpclient-2.3.3 geventhttpclient-2.3.3 changelog | 7 ++ patches/series | 1 patches/test-Increase-the-read-of-the-TLS-handshake-in-sni_c.patch | 34 ++++++++++ 3 files changed, 42 insertions(+) diff -Nru geventhttpclient-2.3.3/debian/changelog geventhttpclient-2.3.3/debian/changelog --- geventhttpclient-2.3.3/debian/changelog 2024-12-19 06:21:22.000000000 +0100 +++ geventhttpclient-2.3.3/debian/changelog 2025-05-23 21:06:15.000000000 +0200 @@ -1,3 +1,10 @@ +geventhttpclient (2.3.3-1.1) UNRELEASED; urgency=medium + + * Non-maintainer upload. + * Add patch to fix the testuite with OpenSSL 3.5 (Closes: #1102957). + + -- Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Fri, 23 May 2025 21:06:15 +0200 + geventhttpclient (2.3.3-1) unstable; urgency=medium * New upstream release diff -Nru geventhttpclient-2.3.3/debian/patches/series geventhttpclient-2.3.3/debian/patches/series --- geventhttpclient-2.3.3/debian/patches/series 2024-12-19 06:21:22.000000000 +0100 +++ geventhttpclient-2.3.3/debian/patches/series 2025-05-23 21:06:15.000000000 +0200 @@ -1 +1,2 @@ add-llhttp-v6.0.10.patch +test-Increase-the-read-of-the-TLS-handshake-in-sni_c.patch diff -Nru geventhttpclient-2.3.3/debian/patches/test-Increase-the-read-of-the-TLS-handshake-in-sni_c.patch geventhttpclient-2.3.3/debian/patches/test-Increase-the-read-of-the-TLS-handshake-in-sni_c.patch --- geventhttpclient-2.3.3/debian/patches/test-Increase-the-read-of-the-TLS-handshake-in-sni_c.patch 1970-01-01 01:00:00.000000000 +0100 +++ geventhttpclient-2.3.3/debian/patches/test-Increase-the-read-of-the-TLS-handshake-in-sni_c.patch 2025-05-23 21:06:15.000000000 +0200 @@ -0,0 +1,34 @@ +From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> +Date: Tue, 13 May 2025 21:34:01 +0200 +Subject: [PATCH] test: Increase the read of the TLS handshake in + sni_checker_server() + +If only the first 1KiB of the TLS packet is read then there should be no +surprise if things don't work out if something changes. +Newer openssl stuffs more bytes into the handshake so the test failed. + +Read 4KiB now and hope of the best. + +Applied-Upstream: https://github.com/geventhttpclient/geventhttpclient/commit/267cca1c7dd5158827f4f2b04453eb658ebb90bf +Bug-Debian: http://bugs.debian.org/1102957 +Signed-off-by: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> +--- + tests/test_ssl.py | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/tests/test_ssl.py b/tests/test_ssl.py +index 58f4190af67be..1c68423583258 100644 +--- a/tests/test_ssl.py ++++ b/tests/test_ssl.py +@@ -164,7 +164,7 @@ CERT = os.path.join(BASEDIR, "server.crt") + def run(sock): + while True: + conn, addr = sock.accept() +- client_hello = conn.recv(1024) ++ client_hello = conn.recv(4096) + return extract_sni_from_client_hello(client_hello) + + def extract_sni_from_client_hello(hello_packet): +-- +2.49.0 +