Your message dated Tue, 05 Aug 2025 12:48:31 +0000
with message-id <[email protected]>
and subject line Bug#1104209: fixed in dulwich 0.22.7-2
has caused the Debian Bug report #1104209,
regarding dulwich: flaky autopkgtest: Connection reset by peer
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1104209: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104209
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: dulwich
Version: 0.22.7-1
Severity: serious
User: [email protected]
Usertags: flaky
Dear maintainer(s),
I looked at the results of the autopkgtest of your package because it
showed up in the migration excuses for gnupg2. I noticed that it
regularly fails on riscv64, but the same failure was found on amd64. I
triggered it 10 times on amd64 and 2 runs failed. I suspect a daemon not
being ready yet and suggest either a retry on failure, or better a
check/delay before the call that triggers the failures.
Because the unstable-to-testing migration software now blocks on
regressions in testing, flaky tests, i.e. tests that flip between
passing and failing without changes to the list of installed packages,
are causing people unrelated to your package to spend time on these
tests.
Don't hesitate to reach out if you need help and some more information
from our infrastructure.
Paul
amd64 failure log:
https://ci.debian.net/packages/d/dulwich/testing/amd64/60285564/
127s ======================================================================
127s ERROR: test_fetch_pack_depth
(tests.compat.test_client.DulwichTCPClientTest.test_fetch_pack_depth)
127s ----------------------------------------------------------------------
127s Traceback (most recent call last):
127s File
"/tmp/autopkgtest-lxc.wtpjimkl/downtmp/build.oCO/src/dulwich/protocol.py",
line 263, in read_pkt_line
127s pkt_contents = read(size - 4)
127s File "/usr/lib/python3.13/socket.py", line 719, in readinto
127s return self._sock.recv_into(b)
127s ~~~~~~~~~~~~~~~~~~~~^^^
127s ConnectionResetError: [Errno 104] Connection reset by peer
127s
127s The above exception was the direct cause of the following exception:
127s
127s Traceback (most recent call last):
127s File
"/tmp/autopkgtest-lxc.wtpjimkl/downtmp/build.oCO/src/tests/compat/test_client.py",
line 291, in test_fetch_pack_depth
127s result = c.fetch(self._build_path("/server_new.export"), dest,
depth=1)
127s File
"/tmp/autopkgtest-lxc.wtpjimkl/downtmp/build.oCO/src/dulwich/client.py",
line 981, in fetch
127s result = self.fetch_pack(
127s path,
127s ...<7 lines>...
127s protocol_version=protocol_version,
127s )
127s File
"/tmp/autopkgtest-lxc.wtpjimkl/downtmp/build.oCO/src/dulwich/client.py",
line 1438, in fetch_pack
127s _handle_upload_pack_tail(
127s ~~~~~~~~~~~~~~~~~~~~~~~~^
127s proto,
127s ^^^^^^
127s ...<4 lines>...
127s protocol_version=self.protocol_version,
127s ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
127s )
127s ^
127s File
"/tmp/autopkgtest-lxc.wtpjimkl/downtmp/build.oCO/src/dulwich/client.py",
line 699, in _handle_upload_pack_tail
127s for chan, data in _read_side_band64k_data(proto.read_pkt_seq()):
127s ~~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^
127s File
"/tmp/autopkgtest-lxc.wtpjimkl/downtmp/build.oCO/src/dulwich/client.py",
line 557, in _read_side_band64k_data
127s for pkt in pkt_seq:
127s ^^^^^^^
127s File
"/tmp/autopkgtest-lxc.wtpjimkl/downtmp/build.oCO/src/dulwich/protocol.py",
line 312, in read_pkt_seq
127s pkt = self.read_pkt_line()
127s File
"/tmp/autopkgtest-lxc.wtpjimkl/downtmp/build.oCO/src/dulwich/protocol.py",
line 265, in read_pkt_line
127s raise HangupException from exc
127s dulwich.errors.HangupException: The remote server unexpectedly
closed the connection.
OpenPGP_signature.asc
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
Source: dulwich
Source-Version: 0.22.7-2
Done: Jelmer Vernooij <[email protected]>
We believe that the bug you reported is fixed in the latest version of
dulwich, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Jelmer Vernooij <[email protected]> (supplier of updated dulwich package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 09 Jan 2025 00:00:00 +0000
Source: dulwich
Architecture: source
Version: 0.22.7-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Python Team <[email protected]>
Changed-By: Jelmer Vernooij <[email protected]>
Closes: 1104209
Changes:
dulwich (0.22.7-2) unstable; urgency=medium
.
* Add patch to fix protocol v2 deepen command flush packet handling.
Prevents server implementations from stopping reading and missing
the 'done' command, which fixes flaky autopkgtest failures.
(Closes: #1104209)
Checksums-Sha1:
4b18f5187700e9084da91d820b339e33b538953e 2200 dulwich_0.22.7-2.dsc
77d8a1a1b5785ecb5c85655b1cb3d274d8f01d01 9116 dulwich_0.22.7-2.debian.tar.xz
4aaa65eb1ab426ad040809511929e5a2087268e3 12655
dulwich_0.22.7-2_source.buildinfo
Checksums-Sha256:
ae54b3b9d10f7fb13e4e991f2f0667f72afc9086214cb5735aeeae63e658ebe8 2200
dulwich_0.22.7-2.dsc
55c202335a65fdfd2aee970e7a3d52d5d5ff90e3f2cc90671ddfd6526772fd46 9116
dulwich_0.22.7-2.debian.tar.xz
ba4bd96fe149593b0d11f4e3402f7780c328ff80a888ad831b7b92912b4dd56c 12655
dulwich_0.22.7-2_source.buildinfo
Files:
b484a292f4b50e3b97673de455dd3f5d 2200 python optional dulwich_0.22.7-2.dsc
5794f579aaf1a6167e6ae57bfce0c7fe 9116 python optional
dulwich_0.22.7-2.debian.tar.xz
17cad7fdc246f093b102c70322857d67 12655 python optional
dulwich_0.22.7-2_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=fiko
-----END PGP SIGNATURE-----
pgpuz9axQEHl5.pgp
Description: PGP signature
--- End Message ---