Everything appears consistent with the agreed upon SRU policy exception. The relevant packaging changes are documented in the changelog, and Andreas has already done some verification of the upstream tarball in review[1].
I agree with the above that the riscv64 and i386 failures are not significant here. The i386 baseline is already red[2], and tests have not previously run on jammy/riscv64. Everything else looks good to me. [1] https://code.launchpad.net/~bryce/ubuntu/+source/openldap/+git/openldap/+merge/484839/comments/1316750 [2] https://autopkgtest.ubuntu.com/packages/openldap -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to openldap in Ubuntu. https://bugs.launchpad.net/bugs/2085192 Title: Backport new upstream microrelease 2.5.19 to jammy Status in openldap package in Ubuntu: In Progress Status in openldap source package in Jammy: Fix Committed Status in openldap source package in Plucky: In Progress Bug description: [Impact] MRE for the latest stable OpenLDAP 2.5.x release, 2.5.19. This update includes bugfixes only following the SRU policy exception defined at https://wiki.ubuntu.com/OpenLDAPUpdates. [Major Changes] See the list of bugs fixed in this release here: https://lists.openldap.org/hyperkitty/list/openldap- annou...@openldap.org/thread/7KZAKDA6JVNDFXF4L4T5EPAXTWNAWRW3/ [Test Plan] 1. Upstream gitlab pipeline results: https://git.openldap.org/openldap/openldap/-/commit/923ed40c391af61cd2da0797c254bae749e4da50/pipelines 2. Upstream "call for testing": https://lists.openldap.org/hyperkitty/list/openldap- techni...@openldap.org/message/4W7ZAJVX72IV3YGIGINH45HVBBD5KCAC/ 3. As described in the MRE wiki page for OpenLDAP, the test plan is to build the package in a PPA and make sure that (a) all build-time tests pass and (b) all autopkgtest runs (from reverse dependencies) also pass. * Build log (amd64) confirming that the build-time testsuite has been performed and completed successfully: - https://launchpadlibrarian.net/789184901/buildlog_ubuntu-jammy-amd64.openldap_2.5.19+dfsg-0ubuntu0.22.04.1_BUILDING.txt.gz * Test results: - openldap: jammy/openldap/2.5.19+dfsg-0ubuntu0.22.04.1 [amd64] + ✅ openldap on jammy for amd64 @ 22.04.25 07:14:56 Log️ 🗒️ - openldap: jammy/openldap/2.5.19+dfsg-0ubuntu0.22.04.1 [arm64] + ✅ openldap on jammy for arm64 @ 22.04.25 07:15:18 Log️ 🗒️ - openldap: jammy/openldap/2.5.19+dfsg-0ubuntu0.22.04.1 [armhf] + ✅ openldap on jammy for armhf @ 22.04.25 07:18:34 Log️ 🗒️ - openldap: jammy/openldap/2.5.19+dfsg-0ubuntu0.22.04.1 [i386] + ❌ openldap on jammy for i386 @ 22.04.25 07:35:04 Log️ 🗒️ • slapd FAIL 🟥 • smbk5pwd FAIL 🟥 • sha2-contrib FAIL 🟥 - openldap: jammy/openldap/2.5.19+dfsg-0ubuntu0.22.04.1 [ppc64el] + ✅ openldap on jammy for ppc64el @ 22.04.25 07:16:55 Log️ 🗒️ - openldap: jammy/openldap/2.5.19+dfsg-0ubuntu0.22.04.1 [riscv64] + ⛔ openldap on jammy for riscv64 @ 22.04.25 08:52:12 Log️ 🗒️ • testbed BAD ⛔ - openldap: jammy/openldap/2.5.19+dfsg-0ubuntu0.22.04.1 [s390x] + ✅ openldap on jammy for s390x @ 22.04.25 07:16:01 Log️ 🗒️ riscv64 is a new architecture, and i386 is a semi-obsolete one so their test failures are probably not relevant to the validity of this backport. [Where problems could occur] Upstream tests are always executed during build-time. There are many reverse dependencies whose dep8 tests depend on OpenLDAP so the coverage is good. Nevertheless, there is always a risk for something to break since we are dealing with a microrelease upgrade. Whenever a test failure is detected, we will be on top of it and make sure it doesn't affect existing users. [Other Info] This is a reoccurring MRE. See below for links to previous OpenLDAP MREs. * CVEs fixed by this release: - None. Current versions in supported releases that got updates: openldap | 2.5.16+dfsg-0ubuntu0.22.04.2 | jammy-security openldap | 2.5.18+dfsg-0ubuntu0.22.04.3 | jammy-updates Special cases: - None. Previous MREs for OpenLDAP: - https://pad.lv/1977627 - https://pad.lv/1983618 - https://pad.lv/2007625 - https://pad.lv/2027079 - https://pad.lv/2029170 - https://pad.lv/2040465 - https://pad.lv/2067745 As usual we test and prep from the PPA and then push through SRU/Security as applicable. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/2085192/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp