Your message dated Sat, 22 Sep 2018 21:20:35 +0000
with message-id <e1g3pkn-000bqw...@fasolo.debian.org>
and subject line Bug#908136: fixed in h2o 2.2.5+dfsg2-1
has caused the Debian Bug report #908136,
regarding src:h2o: FTBFS on amd64
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
908136: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908136
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:h2o
Version: 2.2.5+dfsg1-6
Severity: serious

Dear Maintainer,

when trying to build h2o from source on amd64, inside sbuild, it fails:

    h2o server (pid:14780) is ready to serve requests
    fetch-ocsp-response (using OpenSSL 1.1.1-pre9 (beta) 21 Aug 2018)
    failed to extract ocsp URI from examples/h2o/server.crt
    [OCSP Stapling] disabled for certificate file:examples/h2o/server.crt
    
        #   Failed test at t/50reverse-proxy-session-resumption.t line 118.
        #          got: '0'
        #     expected: '1'
    killing /<<PKGBUILDDIR>>/obj-x86_64-linux-gnu/h2o... received SIGTERM, 
gracefully shutting down
    killed (got 0)
    killing /<<PKGBUILDDIR>>/obj-x86_64-linux-gnu/h2o... received SIGTERM, 
gracefully shutting down
    killed (got 0)
        # Looks like you failed 1 test of 5.
    
    #   Failed test 'lifetime'
    #   at t/50reverse-proxy-session-resumption.t line 121.

And further failures.
Please also see the attached build log.

Cheers,
Chris

Attachment: h2o_2.2.5+dfsg1-6_amd64-2018-09-06T13:21:48Z.build.gz
Description: application/gzip


--- End Message ---
--- Begin Message ---
Source: h2o
Source-Version: 2.2.5+dfsg2-1

We believe that the bug you reported is fixed in the latest version of
h2o, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 908...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Apollon Oikonomopoulos <apoi...@debian.org> (supplier of updated h2o package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 22 Sep 2018 23:33:20 +0300
Source: h2o
Binary: h2o libh2o0.13 libh2o-evloop0.13 libh2o-dev libh2o-evloop-dev 
libh2o-dev-common h2o-doc
Architecture: source
Version: 2.2.5+dfsg2-1
Distribution: unstable
Urgency: medium
Maintainer: Apollon Oikonomopoulos <apoi...@debian.org>
Changed-By: Apollon Oikonomopoulos <apoi...@debian.org>
Description:
 h2o        - optimized HTTP/1.x, HTTP/2 server
 h2o-doc    - optimized HTTP/1.x, HTTP/2 server - documentation
 libh2o-dev - dev helpers of the H2O library compiled with libuv
 libh2o-dev-common - H2O library headers
 libh2o-evloop-dev - dev helpers of the H2O library compiled with its own event 
loop
 libh2o-evloop0.13 - H2O library compiled with its own event loop
 libh2o0.13 - H2O library compiled with libuv
Closes: 908124 908136
Changes:
 h2o (2.2.5+dfsg2-1) unstable; urgency=medium
 .
   * d/watch: mangle upstream alpha/beta/rc versions.
   * Modify upstream source to use the system's jquery and repack, bumping dfsg
     revision in the process.
   * Disable some tests broken by unexpected TLSv1.3 client support  and force
     TLSv1.2 on all s_client test invocations. (Closes: #908136)
   * Link libh2o and libh2o-evloop against libwslay. (Closes: #908124)
   * Bump Standards-Version to 4.2.1; no changes needed.
   * d/rules: respect the nocheck build option.
Checksums-Sha1:
 b38de9c5e201674f620bcc9074d73c2e89db7136 2607 h2o_2.2.5+dfsg2-1.dsc
 fab346b873f07f5de65709d7a925c52555637f83 11138636 h2o_2.2.5+dfsg2.orig.tar.xz
 0813c7c9c7433571d3c97972c61d1243e26166ca 13140 h2o_2.2.5+dfsg2-1.debian.tar.xz
 86118d0f0da48218ab1d7f3d8e5ceb2014636802 10134 
h2o_2.2.5+dfsg2-1_source.buildinfo
Checksums-Sha256:
 65313782b0c62c87e8a56f39d72e1bc10fec5a6f69bf99bc15861e8c597e0ddf 2607 
h2o_2.2.5+dfsg2-1.dsc
 a46894bd85da6528d4ad90ce0443b48118718296175061a1a1156e9e3af60a0d 11138636 
h2o_2.2.5+dfsg2.orig.tar.xz
 a07ee0ce55bb2a2c8c04cb89200b4609f6a46b051d02f286d837e9a496f4a10a 13140 
h2o_2.2.5+dfsg2-1.debian.tar.xz
 e0314fb356381257ec61dbbb7d93c8446fef7fed242cd27e6db0ee617af4c1d6 10134 
h2o_2.2.5+dfsg2-1_source.buildinfo
Files:
 9c8c20c6b371fe65bc3e07b52706f9ef 2607 httpd optional h2o_2.2.5+dfsg2-1.dsc
 fc77e39211fd29585b0c470053d5cc86 11138636 httpd optional 
h2o_2.2.5+dfsg2.orig.tar.xz
 38996922460f83ebc7742ffe31abacc4 13140 httpd optional 
h2o_2.2.5+dfsg2-1.debian.tar.xz
 8ef36e2b9261baee8eaae85071f8fe3f 10134 httpd optional 
h2o_2.2.5+dfsg2-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=mwnm
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to