** Description changed:

  This bug tracks the following MRE updates for the Squid package:
  
-   noble (24.04): Squid 6.13
-   oracular (24.10): Squid 6.13
+   noble (24.04): Squid 6.13
+   oracular (24.10): Squid 6.13
  
  This update includes bugfixes following the SRU policy exception defined
  at https://wiki.ubuntu.com/SquidUpdates.
  
  [Upstream changes]
  
  https://github.com/squid-cache/squid/blob/master/ChangeLog
  (noble: 6.6 -> 6.10 -> 6.13); (oracular: 6.10 -> 6.13)
  
  No new features, just bug fixes, docs, and codebase cleanups.  Bug fixes
  include the following:
  
-       - Bug 5352: Do not get stuck when RESPMOD is slower than read(2)
-       - Bug 5405: Large uploads fill request buffer and die
-       - Bug 5093: List http_port params that https_port/ftp_port lack
-       - Bug 5311: clarify configuration byte units
-       - Bug 5091: document that changes to workers require restart
-       - Bug 5481: Fix GCC v14 build [-Wmaybe-uninitialized]
-       - Fix GCC v14 [-Wanalyzer-null-dereference] warnings in Kerberos
-       - Nil request dereference in ACLExtUser and SourceDomainCheck ACLs
-       - Fix systemd startup sequence to require active Local Filesystem
-       - ext_time_quota_acl: remove -l option
-       - Fix validation of Digest auth header parameters
-       - Improve robustness of DNS code on reconfigure
-       - Prevent slow memory leak in TCP DNS queries
-       - Improve errors emitted when invalid ACLs are parsed
+  - Bug 5352: Do not get stuck when RESPMOD is slower than read(2)
+  - Bug 5405: Large uploads fill request buffer and die
+  - Bug 5093: List http_port params that https_port/ftp_port lack
+  - Bug 5311: clarify configuration byte units
+  - Bug 5091: document that changes to workers require restart
+  - Bug 5481: Fix GCC v14 build [-Wmaybe-uninitialized]
+  - Fix GCC v14 [-Wanalyzer-null-dereference] warnings in Kerberos
+  - Nil request dereference in ACLExtUser and SourceDomainCheck ACLs
+  - Fix systemd startup sequence to require active Local Filesystem
+  - ext_time_quota_acl: remove -l option
+  - Fix validation of Digest auth header parameters
+  - Improve robustness of DNS code on reconfigure
+  - Prevent slow memory leak in TCP DNS queries
+  - Improve errors emitted when invalid ACLs are parsed
  
  ext_time_quota_acl is an external acl helper for usage quotas.  The -l
  flag permitted logging to a file, and was dropped to facilitate a
  rewrite of ext_time_quota_acl into C++.  Upstream's recommendation for
  users of this functionality is to emulate it using shell redirection.
  (See https://github.com/squid-cache/squid/pull/1872)
  
  [Test Plan]
  
- Link the build log containing all tests being executed: [TBD]
+ Link the build log containing all tests being executed: 
+ 
https://launchpadlibrarian.net/790377113/buildlog_ubuntu-oracular-amd64.squid_6.13-0ubuntu0.24.10.1~oracular1_BUILDING.txt.gz
+ 
+   PASS: syntheticoperators
+   PASS: splay
+   PASS: mem_node_test
+   PASS: VirtualDeleteOperator
+   PASS: mem_hdr_test
+   PASS: ESIExpressions
+   ============================================================================
+   Testsuite summary for Squid Web Proxy 6.13
+   ============================================================================
+   # TOTAL: 6
+   # PASS:  6
+   # SKIP:  0
+   # XFAIL: 0
+   # FAIL:  0
+   # XPASS: 0
+   # ERROR: 0
+ 
+ (Other builds visible at
+ https://launchpad.net/~bryce/+archive/ubuntu/squid-backport-
+ lp2085197/+packages)
  
  All tests are passing during build time, as shown in the build log
  (builds would fail otherwise, see LP: #2004050).
  
  Results of local autopkgtest run against all the new Squid versions
  being uploaded here:
  
- [TBD]
+ DEP8 tests:
+   - squid: oracular/squid/6.13-0ubuntu0.24.10.1~oracular1
+     + ✅ squid on oracular for amd64 @ 01.05.25 01:25:20 Log️ 🗒️
+     + ✅ squid on oracular for arm64 @ 01.05.25 01:28:24 Log️ 🗒️
+     + ✅ squid on oracular for ppc64el @ 01.05.25 01:27:53 Log️ 🗒️
+     + ✅ squid on oracular for s390x @ 01.05.25 01:26:28 Log️ 🗒️
+     + ❌ squid on oracular for armhf @ 01.05.25 01:28:11 Log️ 🗒️
+       • upstream-test-suite PASS 🟩
+       • squid FAIL 🟥
+     + ❌ squid on oracular for i386 @ 01.05.25 01:17:26 Log️ 🗒️
+       • upstream-test-suite FAIL 🟥
+       • squid FAIL 🟥
+     + ⛔ squid on oracular for riscv64 @ 01.05.25 02:42:09 Log️ 🗒️
+       • testbed BAD ⛔
  
- Ran with ppa-dev-tools for build in [TBD PPA]
+ * The armhf failure is same thing that already happens in production:
+   - https://autopkgtest.ubuntu.com/packages/s/squid/oracular/armhf
+   - Log mentions "Access denied" so is perhaps a platform problem?
  
+ * The riscv64 architecture is relatively new and may not block migration.
+   - There are no results in production for this architecture
+   - https://autopkgtest.ubuntu.com/packages/s/squid/oracular/riscv64
+ 
+ * The i386 architecture is semi-obsolescent, and production is also seeing
+   fails, so presumably this is not a blocking issue either.
+   - https://autopkgtest.ubuntu.com/packages/s/squid/oracular/i386
+ 
+ Ran with ppa-dev-tools for build in
+ https://launchpad.net/~bryce/+archive/ubuntu/squid-backport-lp2085197
  
  [Regression Potential]
  
  Upstream tests are always executed during build-time. Failures would
  prevent builds from succeeding.
  
  Squid does not have many reverse dependencies. However, any upgrade is a
  risk to introduce breakage to other packages. Whenever a regression
  occurs in autopkgtests, we will investigate and provide fixes.
  
  [Other Info]
  
  No CVEs are being addressed this time. Therefore, this should go through
  the updates pockets.
  
  [Previous squid MREs]
  
  * LP: #2013423  5.7 for Jammy
  * LP: #2040470  5.9 for Jammy
  * LP: #2073322  6.10 for Noble

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2085197

Title:
  Backport MRE of squid 6.13 to noble

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid/+bug/2085197/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to