Your message dated Sun, 10 Feb 2019 05:36:29 +0000
with message-id <[email protected]>
and subject line Bug#900156: fixed in puma 3.12.0-1
has caused the Debian Bug report #900156,
regarding puma: FTBFS against openssl 1.1.1
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
900156: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900156
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: puma
Version: 3.11.3-1
Severity: important
User: [email protected]
Usertags: openssl-1.1.1
The new openssl 1.1.1 is currently in experimental [0]. This package
failed to build against this new package [1] while it built fine against
the openssl version currently in unstable [2].
Could you please have a look?
The Error
|TestPumaServerSSLClient#test_verify_client_cert =
|E: Build killed with signal TERM after 150 minutes of inactivity
might be due to the fact that once TLS1.3 is enabled, the SSL_read()
function might return error SSL_ERROR_WANT_READ asking it for a retry.
An "automatic" fix to this behaviour is currently discussed upstream [3]
but it has been always part of the doccumentation - it just hardly
occured before.
[0] https://lists.debian.org/msgid-search/[email protected]
[1]
https://breakpoint.cc/openssl-rebuild/2018-05-03-rebuild-openssl1.1.1-pre6/attempted/puma_3.11.3-1_amd64-2018-05-01T23%3A16%3A10Z
[2]
https://breakpoint.cc/openssl-rebuild/2018-05-03-rebuild-openssl1.1.1-pre6/successful/puma_3.11.3-1_amd64-2018-05-02T18%3A47%3A34Z
[3] https://github.com/openssl/openssl/issues/6234
Sebastian
--- End Message ---
--- Begin Message ---
Source: puma
Source-Version: 3.12.0-1
We believe that the bug you reported is fixed in the latest version of
puma, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Pirate Praveen <[email protected]> (supplier of updated puma package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 10 Feb 2019 10:56:59 +0530
Source: puma
Binary: puma puma-dbgsym
Architecture: source amd64
Version: 3.12.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers
<[email protected]>
Changed-By: Pirate Praveen <[email protected]>
Description:
puma - threaded HTTP 1.1 server for Ruby/Rack applications
Closes: 900156
Changes:
puma (3.12.0-1) unstable; urgency=medium
.
[ Balint Reczey ]
* New upstream version 3.12.0
* Refresh patches
.
[ Pirate Praveen ]
* Fix OpenSSL 1.1.1 test failures with upstream patch (Closes: #900156)
* Bump Standards-Version to 4.3.0 (no changes needed)
* Add myself to uploaders
Checksums-Sha1:
5c5fbb4e9f774c59eff7c88a5cab6826418ad94b 1952 puma_3.12.0-1.dsc
1a9411a70f5c98a5a555d37834da21332fc9203f 215213 puma_3.12.0.orig.tar.gz
860351e581ea45674d929cddd24aa8ae182bf179 6840 puma_3.12.0-1.debian.tar.xz
4592bdc3536ecefc38b7ddfe6bb309a896b96dcc 36964 puma-dbgsym_3.12.0-1_amd64.deb
3e19afbf4cf79c6d6f7fae447315ccedafd19da0 8941 puma_3.12.0-1_amd64.buildinfo
96d4406b3fc1a04382cf595c94aed59b6ac358c7 113416 puma_3.12.0-1_amd64.deb
Checksums-Sha256:
7ebb2a45fb046449bf536403c66ab20482dc2a6f43957f520b80e5ed658c56ec 1952
puma_3.12.0-1.dsc
c604674a201ca8698c4efa34a0d24dd10037de9b91301f349b063aa2ded0532a 215213
puma_3.12.0.orig.tar.gz
40c3f46798a6db9232d9dc66e0ead38b210c9856308c5aed76e796e3bee0297d 6840
puma_3.12.0-1.debian.tar.xz
1d444842d8db76baf01cdca4bfb8a8e25b507046b5a13db01b9214e453916975 36964
puma-dbgsym_3.12.0-1_amd64.deb
7b168e954ad87a0d65254d963add177d41f81224253792191e8df7d1d95a9a9d 8941
puma_3.12.0-1_amd64.buildinfo
b13a9f2033304dc460b219c88cef15dbbd832c0134baa6aa71a96a9fee2e14fa 113416
puma_3.12.0-1_amd64.deb
Files:
54c3bdee9ad8fd08c30a58e9f4609bb6 1952 ruby optional puma_3.12.0-1.dsc
b89fdf9a5b89233c5d165080e555b306 215213 ruby optional puma_3.12.0.orig.tar.gz
4225a1037aafbf3d170eed143083a5b2 6840 ruby optional puma_3.12.0-1.debian.tar.xz
cc2f75e1c6e8f4075846cb8da5c615c4 36964 debug optional
puma-dbgsym_3.12.0-1_amd64.deb
f579299b0a42999d1e0db479a5e832d4 8941 ruby optional
puma_3.12.0-1_amd64.buildinfo
825bdd5093b2cc823046e77d8e36faeb 113416 ruby optional puma_3.12.0-1_amd64.deb
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEE/OFtr184QaN6dPMgC3aSB2Kmt4UFAlxft3MACgkQC3aSB2Km
t4X/oRAAj+Fcrk4NFqfsP9ks4IYmQMS+tleCux7MseRXK5wE9820g3yp1g3BQzi9
ruFkzX/6kXNwG7zEpa5nZqPHjDcq09/7DrQw2+tq7+6QWifMJW5m1lQ4g3SyZM9U
EK52Zccu1mHkwz9/imQrLDtE5vzDSyeR0SteJCAkJgjX4ovnkWYYu8hARHL9J7rb
+TzCHzTSdjWp9+AbD9awR2clSuA07SZWSJqWtlJmDjM9/vq3dtkG66jtFoxL8JXA
3pV0+hQv86gQe+12lJAU2NlxfXya52stF6rkZakl+QTBkoRyip0R+xrWBjx+qBcH
kfknrhtjLtB6wA7Ypa5C9maDTFA2PF+sc1T9ppjqfbpTbQfOUFbIBg7WQNk5zrWV
lTpSQaujNcy4hFWZ1ERDc4RQRkkaE494FVsmPuwa8lb0JiF4/hE8sFBrCXVAR26B
rfIOuS0CfmZymVI1GVdqb6Zndea9nyDi477K4SbnDVpnSp2kwYn8RUzCmbHtRQAL
ddx/+FSYsWNzG4m9uBUKuaWrM/1MUIcAykQEIJoMm4PJ/gsc0h+slnjrs6dgbeCA
5SA1FtjWul+peE/N2KtB3XMmwBIiM5FYAANCGs92pUIYgFax7ZVXXUwC4EP/0fJR
df2m/iRdUm6EFJIq5ftmLhejYIFykaXL2gdHabBgdKwSNnUUBlA=
=6i0y
-----END PGP SIGNATURE-----
--- End Message ---
_______________________________________________
Pkg-ruby-extras-maintainers mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-ruby-extras-maintainers