Your message dated Mon, 20 Mar 2023 21:05:27 +0000
with message-id <e1pemh5-003gc2...@respighi.debian.org>
and subject line unblock ruby-kubeclient
has caused the Debian Bug report #1033218,
regarding unblock: ruby-kubeclient/4.9.3-2
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1033218: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033218
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian....@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: ruby-kubecli...@packages.debian.org
Control: affects -1 + src:ruby-kubeclient
Please unblock package ruby-kubeclient
[ Reason ]
Fixes ftbfs/rc bug #1032551
[ Impact ]
package ftbfs
[ Tests ]
Upstream tests passed.
[ Risks ]
This was discussed with upstream and it is safe to ignore these
failures. https://github.com/ManageIQ/kubeclient/issues/609
[ Checklist ]
[x] all changes are documented in the d/changelog
[x] I reviewed all changes and I approve them
[x] attach debdiff against the package in testing
[ Other info ]
unblock ruby-kubeclient/4.9.3-2
diff -Nru ruby-kubeclient-4.9.3/debian/changelog ruby-kubeclient-4.9.3/debian/changelog
--- ruby-kubeclient-4.9.3/debian/changelog 2022-08-21 16:34:09.000000000 +0530
+++ ruby-kubeclient-4.9.3/debian/changelog 2023-03-20 12:34:36.000000000 +0530
@@ -1,3 +1,9 @@
+ruby-kubeclient (4.9.3-2) unstable; urgency=medium
+
+ * Disable tests that checks expired certificates (Closes: #1032551)
+
+ -- Pirate Praveen <prav...@debian.org> Mon, 20 Mar 2023 12:34:36 +0530
+
ruby-kubeclient (4.9.3-1) unstable; urgency=medium
[ vinay-keshava ]
diff -Nru ruby-kubeclient-4.9.3/debian/patches/disable-expired-certs-test.patch ruby-kubeclient-4.9.3/debian/patches/disable-expired-certs-test.patch
--- ruby-kubeclient-4.9.3/debian/patches/disable-expired-certs-test.patch 1970-01-01 05:30:00.000000000 +0530
+++ ruby-kubeclient-4.9.3/debian/patches/disable-expired-certs-test.patch 2023-03-20 12:34:36.000000000 +0530
@@ -0,0 +1,16 @@
+These are expired certificates and regenrating them currently require creating
+a k0s cluster.
+
+Forwarded: https://github.com/ManageIQ/kubeclient/issues/609
+
+--- a/test/test_config.rb
++++ b/test/test_config.rb
+@@ -232,7 +232,7 @@
+ if custom_ca
+ # When certificates expire one way to recreate them is using a k0s single-node cluster:
+ # test/config/update_certs_k0s.rb
+- assert(context.ssl_options[:cert_store].verify(context.ssl_options[:client_cert]))
++ #assert(context.ssl_options[:cert_store].verify(context.ssl_options[:client_cert]))
+ end
+ else
+ assert_nil(context.ssl_options[:client_cert])
diff -Nru ruby-kubeclient-4.9.3/debian/patches/series ruby-kubeclient-4.9.3/debian/patches/series
--- ruby-kubeclient-4.9.3/debian/patches/series 2022-08-21 16:34:09.000000000 +0530
+++ ruby-kubeclient-4.9.3/debian/patches/series 2023-03-20 12:34:36.000000000 +0530
@@ -1,2 +1,3 @@
remove-bundler.patch
remove-git-in-gemspec.patch
+disable-expired-certs-test.patch
--- End Message ---
--- Begin Message ---
Unblocked.
--- End Message ---