Hi, On Tue, Jun 04, 2019 at 10:09:29AM -1000, David Prévot wrote: > Hi, > > Le 04/06/2019 à 09:56, Paul Gevers a écrit : > > > Normally I copy some of the output at the bottom of this report, but in > > this case I couldn't spot the real failure > > Here it is (the trick is to grep for the “KO” string). > > > Testing src/Symfony/Component/Validator > > > > […] > > > > There were 2 errors: > > > > 1) > > Symfony\Component\Validator\Tests\Constraints\EmailValidatorTest::testStrictWithInvalidEmails > > with data set #26 ('�@iana.org') > > Invalid argument supplied for foreach() > > > > /usr/share/php/Doctrine/Common/Lexer/AbstractLexer.php:261 > > /usr/share/php/Doctrine/Common/Lexer/AbstractLexer.php:96 > > /usr/share/php/Egulias/EmailValidator/EmailParser.php:41 > > /usr/share/php/Egulias/EmailValidator/Validation/RFCValidation.php:30 > > /usr/share/php/Egulias/EmailValidator/Validation/NoRFCWarningsValidation.php:21 > > /usr/share/php/Egulias/EmailValidator/EmailValidator.php:37 > > /usr/share/php/Symfony/Component/Validator/Constraints/EmailValidator.php:66 > > /tmp/autopkgtest-lxc.ass2zlnj/downtmp/build.22F/src/src/Symfony/Component/Validator/Tests/Constraints/EmailValidatorTest.php:116 > > > > 2) > > Symfony\Component\Validator\Tests\Constraints\EmailValidatorTest::testStrictWithInvalidEmails > > with data set #27 ('test@�.org') > > Invalid argument supplied for foreach() > > > > /usr/share/php/Doctrine/Common/Lexer/AbstractLexer.php:261 > > /usr/share/php/Doctrine/Common/Lexer/AbstractLexer.php:96 > > /usr/share/php/Egulias/EmailValidator/EmailParser.php:41 > > /usr/share/php/Egulias/EmailValidator/Validation/RFCValidation.php:30 > > /usr/share/php/Egulias/EmailValidator/Validation/NoRFCWarningsValidation.php:21 > > /usr/share/php/Egulias/EmailValidator/EmailValidator.php:37 > > /usr/share/php/Symfony/Component/Validator/Constraints/EmailValidator.php:66 > > /tmp/autopkgtest-lxc.ass2zlnj/downtmp/build.22F/src/src/Symfony/Component/Validator/Tests/Constraints/EmailValidatorTest.php:116
Any news here? If that's a non issue, and still be accepted by the release team, allowing to unblock the php7.3 package for buster would from security team point of view prefered, as we will need to follow upstream 7.3 releases for buster-security at some point. Regards, Salvatore