Your message dated Thu, 30 Aug 2018 16:34:52 +0000
with message-id <e1fvpug-0001o8...@fasolo.debian.org>
and subject line Bug#906976: fixed in mitmproxy 4.0.4-4
has caused the Debian Bug report #906976,
regarding FTBFS in buster
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
906976: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906976
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:mitmproxy
Version: 4.0.4-3
Severity: serious
Tags: ftbfs

Dear maintainer:

I tried to build this package in buster but it failed:

--------------------------------------------------------------------------------
[...]
 debian/rules build-indep
cat: debian/mitmproxy.manpages: No such file or directory
dh build-indep --with python3 --buildsystem=pybuild
   dh_update_autotools_config -i -O--buildsystem=pybuild
   dh_auto_configure -i -O--buildsystem=pybuild
I: pybuild base:217: python3.6 setup.py config 
running config
   dh_auto_build -i -O--buildsystem=pybuild
I: pybuild base:217: /usr/bin/python3 setup.py build 
running build
running build_py
creating /<<PKGBUILDDIR>>/.pybuild/cpython3_3.6_mitmproxy/build/mitmproxy
copying mitmproxy/connections.py -> 
/<<PKGBUILDDIR>>/.pybuild/cpython3_3.6_mitmproxy/build/mitmproxy
copying mitmproxy/websocket.py -> 
/<<PKGBUILDDIR>>/.pybuild/cpython3_3.6_mitmproxy/build/mitmproxy

[... snipped ...]


    def test_verification_w_confdir(self, tdata):
        self.options.update(
            ssl_insecure=False,
            ssl_verify_upstream_trusted_confdir=tdata.path(
                "mitmproxy/data/servercert/"
            ),
            ssl_verify_upstream_trusted_ca=None,
        )
>       assert self._request().status_code == 242
E       assert 502 == 242
E        +  where 502 = Response(502 Bad Gateway, text/html, 
307b).status_code
E        +    where Response(502 Bad Gateway, text/html, 307b) = 
<bound method TestHTTPSUpstreamServerVerificationWTrustedCert._request of 
<test.mitmproxy.proxy.test_server.TestHTTPSUpstreamServerVerificationWTrustedCert
 object at 0x7f1e5d4ab710>>()
E        +      where <bound method 
TestHTTPSUpstreamServerVerificationWTrustedCert._request of 
<test.mitmproxy.proxy.test_server.TestHTTPSUpstreamServerVerificationWTrustedCert
 object at 0x7f1e5d4ab710>> = 
<test.mitmproxy.proxy.test_server.TestHTTPSUpstreamServerVerificationWTrustedCert
 object at 0x7f1e5d4ab710>._request

test/mitmproxy/proxy/test_server.py:320: AssertionError
_ 
TestHTTPSUpstreamServerVerificationWTrustedCert.test_verification_w_pemfile 
__

self = 
<test.mitmproxy.proxy.test_server.TestHTTPSUpstreamServerVerificationWTrustedCert
 object at 0x7f1e5c2e5390>
tdata = <mitmproxy.utils.data.Data object at 0x7f1e5c2e58d0>

    def test_verification_w_pemfile(self, tdata):
        self.options.update(
            ssl_insecure=False,
            ssl_verify_upstream_trusted_confdir=None,
            ssl_verify_upstream_trusted_ca=tdata.path(
                "mitmproxy/data/servercert/trusted-root.pem"
            ),
        )
>       assert self._request().status_code == 242
E       assert 502 == 242
E        +  where 502 = Response(502 Bad Gateway, text/html, 
307b).status_code
E        +    where Response(502 Bad Gateway, text/html, 307b) = 
<bound method TestHTTPSUpstreamServerVerificationWTrustedCert._request of 
<test.mitmproxy.proxy.test_server.TestHTTPSUpstreamServerVerificationWTrustedCert
 object at 0x7f1e5c2e5390>>()
E        +      where <bound method 
TestHTTPSUpstreamServerVerificationWTrustedCert._request of 
<test.mitmproxy.proxy.test_server.TestHTTPSUpstreamServerVerificationWTrustedCert
 object at 0x7f1e5c2e5390>> = 
<test.mitmproxy.proxy.test_server.TestHTTPSUpstreamServerVerificationWTrustedCert
 object at 0x7f1e5c2e5390>._request

test/mitmproxy/proxy/test_server.py:330: AssertionError
=============================== warnings summary 
===============================
.pybuild/cpython3_3.6_mitmproxy/build/test/mitmproxy/tools/console/test_master.py::TestMaster::()::test_basic
  /usr/lib/python3/dist-packages/_pytest/python.py:195: RuntimeWarning: 
coroutine 'TestMaster.test_basic' was never awaited
    testfunction(**testargs)

-- Docs: http://doc.pytest.org/en/latest/warnings.html
====== 5 failed, 805 passed, 545 deselected, 1 warnings in 43.08 
seconds =======
E: pybuild pybuild:338: test: plugin distutils failed with: exit code=1: cd 
/<<PKGBUILDDIR>>/.pybuild/cpython3_3.6_mitmproxy/build; python3.6 -m pytest 
"-k-TestHARDump -k-TestScripts -k-test_mitmweb -k-test_mitmdump"
dh_auto_test: pybuild --test --test-pytest -i python{version} -p 3.6 returned 
exit code 13
make: *** [debian/rules:11: build-indep] Error 25
dpkg-buildpackage: error: debian/rules build-indep subprocess returned exit 
status 2
--------------------------------------------------------------------------------

The build was made with "dpkg-buildpackage -A" in my autobuilder.
Most probably, it also fails here in reproducible builds:

https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/mitmproxy.html

where you can get a full build log if you need it.

If this is really a bug in one of the build-depends, please use reassign and 
affects,
so that this is still visible in the BTS web page for this package.

Thanks.

--- End Message ---
--- Begin Message ---
Source: mitmproxy
Source-Version: 4.0.4-4

We believe that the bug you reported is fixed in the latest version of
mitmproxy, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 906...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sebastien Delafond <s...@debian.org> (supplier of updated mitmproxy package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 30 Aug 2018 18:00:54 +0200
Source: mitmproxy
Binary: mitmproxy
Architecture: source
Version: 4.0.4-4
Distribution: unstable
Urgency: medium
Maintainer: Sebastien Delafond <s...@debian.org>
Changed-By: Sebastien Delafond <s...@debian.org>
Description:
 mitmproxy  - SSL-capable man-in-the-middle HTTP proxy
Closes: 906976
Changes:
 mitmproxy (4.0.4-4) unstable; urgency=medium
 .
   * Remove references to manpage in debian/rules
   * Blacklist tests that require internet access (Closes: #906976)
Checksums-Sha1:
 02123cd3c737dc7d388cef2d3cb1abcf4e437360 2155 mitmproxy_4.0.4-4.dsc
 be31717166c4e1c92c909c2201bd16a1cc48f8eb 12172 mitmproxy_4.0.4-4.debian.tar.xz
 7bf9995acd266f20e3ad32a41847f50be77b9dad 8284 mitmproxy_4.0.4-4_amd64.buildinfo
Checksums-Sha256:
 08e7c39ebd6656a0c06b10ee1922c832f117e73ba16b1d6de0acb2b42d52bdc8 2155 
mitmproxy_4.0.4-4.dsc
 43423440c0abe8d8b4e5929eb20c92a149f3333fd6121a420fb0a2a2aaaa094d 12172 
mitmproxy_4.0.4-4.debian.tar.xz
 b5b63a4c40d6452e41b152902dc5571cbc214e682fe2ef637c220859410edf7c 8284 
mitmproxy_4.0.4-4_amd64.buildinfo
Files:
 b790b24d8eedd8755414d582ec91ebaa 2155 net optional mitmproxy_4.0.4-4.dsc
 eb5f61d2c6ecdc9fa1b79946047b64cc 12172 net optional 
mitmproxy_4.0.4-4.debian.tar.xz
 9c5f5d1c2ef6d5cdfe24ea103ab53132 8284 net optional 
mitmproxy_4.0.4-4_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAluIFc8ACgkQEL6Jg/PV
nWSy2Af/dgtT8z691qKUzm6zsJHLalnW6Xked909ptcFOVU59Cks8tfiN3snxHod
3694+X80/zwSGeE5JWR0h59YO/A7eQxoXsgAWpm7Pn1+bfPKDePxJWTtiy6KkTex
mhOGZNUdatIACjW/nyxlMqvJvpGY6N4bXEs/v1jM7z3e4mPsZQ0ZQZhSUa3sKQsB
k+VPiAH7P9W/5J0ChbdPtoIIT3K6ovGpS3D7RigbcsX6J284leAlqxRfE6NNRqbf
aa1y3w1Swu91nOkEsK7rWgmY+gTzsHQADN3kNp+YnNVOXzRktNFkYt8jDaBLxqvD
isn+ntGD0ZbHH2UmOqu7DEvyFaBWcQ==
=1VGg
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to