Package: release.debian.org
User: release.debian....@packages.debian.org
Usertags: pu
Tags: buster
Severity: normal

This is the proposed update for Buster to fix a build failure against
openssl 1.1.1j which is proposed for Buster.
The changes touch only the test suite:
- A fix in openssl for the SSLv23 padding led to a failure in the
  m2crypto test suite. The fix is to remove the offending test.

- The test suite fails in an IPv6 only environment. This has been
  observed in the last buster-pu upload as well in unstable. In
  unstable it has been dealt by temporary disabling the test_ssl.py file
  in which a lot of tests are failing in an IPv6 only environment.
  I added the same change to this update. If it is preferred to keep
  test running, I could remove it again and retriggred the build as
  needed.

I verified that the proposed m2crypto package builds against the
proposed openssl package.

Sebastian
diff -Nru m2crypto-0.31.0/debian/changelog m2crypto-0.31.0/debian/changelog
--- m2crypto-0.31.0/debian/changelog    2021-01-24 12:01:15.000000000 +0100
+++ m2crypto-0.31.0/debian/changelog    2021-02-23 23:41:19.000000000 +0100
@@ -1,3 +1,14 @@
+m2crypto (0.31.0-4+deb10u2) buster; urgency=medium
+
+  * Non-maintainer upload.
+  * debian/patches/MR262.patch
+    - fix test failure with recent openssl; Closes: #983013
+  * debian/rules
+    - skip test_ssl.py during tests, more than 50% of its tests fail on an
+      IPv6-only machine; Closes: #979865
+
+ -- Sebastian Andrzej Siewior <sebast...@breakpoint.cc>  Tue, 23 Feb 2021 
23:41:19 +0100
+
 m2crypto (0.31.0-4+deb10u1) buster; urgency=medium
 
   * Non-maintainer upload.
diff -Nru m2crypto-0.31.0/debian/patches/MR262.patch 
m2crypto-0.31.0/debian/patches/MR262.patch
--- m2crypto-0.31.0/debian/patches/MR262.patch  1970-01-01 01:00:00.000000000 
+0100
+++ m2crypto-0.31.0/debian/patches/MR262.patch  2021-02-23 23:35:25.000000000 
+0100
@@ -0,0 +1,29 @@
+From d06eaa88a5f491827733f32027c46de3557fbd05 Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Mat=C4=9Bj=20Cepl?= <mc...@cepl.eu>
+Date: Fri, 19 Feb 2021 15:53:02 +0100
+Subject: [PATCH] Use of RSA_SSLV23_PADDING has been deprecated.
+
+Fixes #293.
+---
+ tests/test_rsa.py | 5 -----
+ 1 file changed, 5 deletions(-)
+
+diff --git a/tests/test_rsa.py b/tests/test_rsa.py
+index 3de5016a..7299785f 100644
+--- a/tests/test_rsa.py
++++ b/tests/test_rsa.py
+@@ -124,11 +124,6 @@ class RSATestCase(unittest.TestCase):
+             ptxt = priv.private_decrypt(ctxt, p)
+             self.assertEqual(ptxt, self.data)
+ 
+-        # sslv23_padding
+-        ctxt = priv.public_encrypt(self.data, RSA.sslv23_padding)
+-        res = priv.private_decrypt(ctxt, RSA.sslv23_padding)
+-        self.assertEqual(res, self.data)
+-
+         # no_padding
+         with six.assertRaisesRegex(self, RSA.RSAError, 'data too small'):
+             priv.public_encrypt(self.data, RSA.no_padding)
+-- 
+GitLab
+
diff -Nru m2crypto-0.31.0/debian/patches/series 
m2crypto-0.31.0/debian/patches/series
--- m2crypto-0.31.0/debian/patches/series       2021-01-24 12:00:36.000000000 
+0100
+++ m2crypto-0.31.0/debian/patches/series       2021-02-23 23:35:48.000000000 
+0100
@@ -5,3 +5,4 @@
 0005-tests.test_rsa-Fix-typo-to-match-for-proper-exceptio.patch
 0006-Be-resilient-against-the-situation-when-no-erorr-hap.patch
 MR261.patch
+MR262.patch
diff -Nru m2crypto-0.31.0/debian/rules m2crypto-0.31.0/debian/rules
--- m2crypto-0.31.0/debian/rules        2018-12-19 07:59:56.000000000 +0100
+++ m2crypto-0.31.0/debian/rules        2021-02-23 23:41:19.000000000 +0100
@@ -18,7 +18,7 @@
 endif
 
 override_dh_auto_test:
-       PYBUILD_SYSTEM=custom PYBUILD_TEST_ARGS="{interpreter} -Wd -m pytest -v 
-rs" dh_auto_test
+       PYBUILD_SYSTEM=custom PYBUILD_TEST_ARGS="{interpreter} -Wd -m pytest 
--ignore tests/test_ssl.py -v -rs" dh_auto_test
 
 override_dh_auto_install:
        dh_auto_install

Reply via email to