Your message dated Wed, 30 Oct 2024 22:10:19 +0000
with message-id <[email protected]>
and subject line Re: Bug#1086466: ostree: FTBFS: ERROR: 
tests/test-remote-gpg-list-keys.sh
has caused the Debian Bug report #1086466,
regarding ostree: FTBFS: ERROR: tests/test-remote-gpg-list-keys.sh
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1086466: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086466
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: src:ostree
Version: 2024.8-1
Severity: serious
Tags: ftbfs

Dear maintainer:

During a rebuild of all packages in unstable, your package failed to build:

--------------------------------------------------------------------------------
[...]
 debian/rules binary
dh binary
   dh_update_autotools_config
   debian/rules override_dh_autoreconf
make[1]: Entering directory '/<<PKGBUILDDIR>>'
mkdir -p debian/tmp-path
env NOCONFIGURE=1 
PATH=/<<PKGBUILDDIR>>/debian/tmp-path:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games
 dh_autoreconf ./autogen.sh
autoreconf: export WARNINGS=
autoreconf: Entering directory '.'
autoreconf: configure.ac: not using Gettext
autoreconf: running: aclocal --force -I buildutil -I libglnx ${ACLOCAL_FLAGS}
autoreconf: configure.ac: tracing
autoreconf: running: libtoolize --copy --force
libtoolize: putting auxiliary files in AC_CONFIG_AUX_DIR, 'build-aux'.

[... snipped ...]

+ '[' uid = fpr ']'
+ IFS=:
+ read -a fields
+ '[' sec = sec ']'
+ '[' -z A25C19F9E5613671 ']'
+ key2_id=4983E32424B34CD8
+ IFS=:
+ read -a fields
+ '[' fpr = sec ']'
+ '[' fpr = ssb ']'
+ '[' fpr = fpr ']'
+ '[' -z AADA0A6CAD88352E79D0AEB2A25C19F9E5613671 ']'
+ '[' -z '' ']'
+ key2_fpr=E4570B6DEEDD21E65788BDCC4983E32424B34CD8
+ IFS=:
+ read -a fields
+ '[' grp = sec ']'
+ '[' grp = ssb ']'
+ '[' grp = fpr ']'
+ IFS=:
+ read -a fields
+ '[' uid = sec ']'
+ '[' uid = ssb ']'
+ '[' uid = fpr ']'
+ IFS=:
+ read -a fields
+ '[' ssb = sec ']'
+ '[' ssb = ssb ']'
+ key2_sub_id=705CAEA31A31929A
+ IFS=:
+ read -a fields
+ '[' fpr = sec ']'
+ '[' fpr = ssb ']'
+ '[' fpr = fpr ']'
+ '[' -z AADA0A6CAD88352E79D0AEB2A25C19F9E5613671 ']'
+ '[' -z E4570B6DEEDD21E65788BDCC4983E32424B34CD8 ']'
+ key2_sub_fpr=63745F6A9210FC9765BF1B1F705CAEA31A31929A
+ IFS=:
+ read -a fields
+ '[' grp = sec ']'
+ '[' grp = ssb ']'
+ '[' grp = fpr ']'
+ IFS=:
+ read -a fields
+ ostree --repo=/var/tmp/tap-test.RUfrYl/repo commit -b test2 -s 'A GPG signed 
commit' -m 'Signed commit body' --tree=dir=files 
--gpg-homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --gpg-sign=A25C19F9E5613671 
--gpg-sign=705CAEA31A31929A
+ ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2
+ assert_file_has_content test2-show '^Found 2 signatures'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e '^Found 2 signatures' test2-show
+ assert_file_has_content test2-show 'public key not found'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'public key not found' test2-show
+ assert_file_has_content test2-show A25C19F9E5613671
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e A25C19F9E5613671 test2-show
+ assert_file_has_content test2-show 705CAEA31A31929A
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 705CAEA31A31929A test2-show
+ echo 'ok signed with both generated keys'
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --export A25C19F9E5613671 
4983E32424B34CD8
+ ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2
+ assert_file_has_content test2-show '^Found 2 signatures'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e '^Found 2 signatures' test2-show
+ assert_not_file_has_content test2-show 'public key not found'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'public key not found' test2-show
+ assert_file_has_content test2-show A25C19F9E5613671
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e A25C19F9E5613671 test2-show
+ assert_file_has_content test2-show 705CAEA31A31929A
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 705CAEA31A31929A test2-show
+ assert_file_has_content test2-show 'Good signature from "Test Key 1 <>"'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Good signature from "Test Key 1 <>"' test2-show
+ assert_file_has_content test2-show 'Good signature from "Test Key 2 <>"'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Good signature from "Test Key 2 <>"' test2-show
+ assert_file_has_content test2-show 'Primary key ID 4983E32424B34CD8'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Primary key ID 4983E32424B34CD8' test2-show
+ echo 'ok verified both generated keys'
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --quick-set-expire 
AADA0A6CAD88352E79D0AEB2A25C19F9E5613671 seconds=1
+ sleep 2
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --export A25C19F9E5613671 
4983E32424B34CD8
+ ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2
+ assert_file_has_content test2-show '^Found 2 signatures'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e '^Found 2 signatures' test2-show
+ assert_not_file_has_content test2-show 'public key not found'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'public key not found' test2-show
+ assert_file_has_content test2-show A25C19F9E5613671
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e A25C19F9E5613671 test2-show
+ assert_file_has_content test2-show 705CAEA31A31929A
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 705CAEA31A31929A test2-show
+ assert_file_has_content test2-show 'BAD signature from "Test Key 1 <>"'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'BAD signature from "Test Key 1 <>"' test2-show
+ assert_file_has_content test2-show 'Key expired'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Key expired' test2-show
+ assert_file_has_content test2-show 'Good signature from "Test Key 2 <>"'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Good signature from "Test Key 2 <>"' test2-show
+ assert_file_has_content test2-show 'Primary key ID 4983E32424B34CD8'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Primary key ID 4983E32424B34CD8' test2-show
+ echo 'ok verified with key1 expired'
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --quick-set-expire 
AADA0A6CAD88352E79D0AEB2A25C19F9E5613671 seconds=0
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --quick-set-expire 
E4570B6DEEDD21E65788BDCC4983E32424B34CD8 seconds=1
+ sleep 2
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --export A25C19F9E5613671 
4983E32424B34CD8
+ ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2
+ assert_file_has_content test2-show '^Found 2 signatures'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e '^Found 2 signatures' test2-show
+ assert_not_file_has_content test2-show 'public key not found'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'public key not found' test2-show
+ assert_file_has_content test2-show A25C19F9E5613671
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e A25C19F9E5613671 test2-show
+ assert_file_has_content test2-show 705CAEA31A31929A
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 705CAEA31A31929A test2-show
+ assert_file_has_content test2-show 'Good signature from "Test Key 1 <>"'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Good signature from "Test Key 1 <>"' test2-show
+ assert_file_has_content test2-show 'BAD signature from "Test Key 2 <>"'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'BAD signature from "Test Key 2 <>"' test2-show
+ assert_file_has_content test2-show 'Primary key ID 4983E32424B34CD8'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Primary key ID 4983E32424B34CD8' test2-show
+ assert_file_has_content test2-show 'Primary key expired'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Primary key expired' test2-show
+ echo 'ok verified with key2 primary expired'
+ false
+ echo 'ok # SKIP gpg --quick-set-expire does not support expiring subkeys'
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --quick-set-expire 
E4570B6DEEDD21E65788BDCC4983E32424B34CD8 seconds=0
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --export A25C19F9E5613671 
4983E32424B34CD8
+ false
+ echo 'ok # SKIP gpg --quick-set-expire does not support expiring subkeys'
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --batch --passphrase '' 
--quick-add-key E4570B6DEEDD21E65788BDCC4983E32424B34CD8 rsa2048 sign never
++ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --list-secret-keys 
--with-colons
gpg: checking the trustdb
gpg: marginals needed: 3  completes needed: 1  trust model: pgp
gpg: depth: 0  valid:   2  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 2u
+ 
gpg_seckey_listing='sec:u:2048:1:A25C19F9E5613671:1730309711:::u:::scSC:::+:::23::0:
fpr:::::::::AADA0A6CAD88352E79D0AEB2A25C19F9E5613671:
grp:::::::::77D9998F239E0596CA32FA15F31CB1F7AC81CC78:
uid:u::::1730309714::0987136B4D556952807B51F8BB0AAF7E845BCA85::Test Key 
1::::::::::0:
sec:u:2048:1:4983E32424B34CD8:1730309711:::u:::scSC:::+:::23::0:
fpr:::::::::E4570B6DEEDD21E65788BDCC4983E32424B34CD8:
grp:::::::::0ED4377F74BD3881385FB26A149838CC3008B1A2:
uid:u::::1730309716::88A002D8DE3362C644091841F91A088A637827FE::Test Key 
2::::::::::0:
ssb:u:2048:1:705CAEA31A31929A:1730309711::::::s:::+:::23:
fpr:::::::::63745F6A9210FC9765BF1B1F705CAEA31A31929A:
grp:::::::::9678A9CC5C6700A2DB4331883B5BE96E21DBC50B:
ssb:u:2048:1:C98EB3524FA3BC24:1730309716::::::s:::+:::23:
fpr:::::::::7536E948EC58972D5B13C42CC98EB3524FA3BC24:
grp:::::::::0690238CC4BB2B4F1051B60ED18923DCF74399E9:'
++ tail -n1
++ awk -F: '{if ($1 == "ssb") print $5}'
+ key2_sub2_id=C98EB3524FA3BC24
++ tail -n1
++ awk -F: '{if ($1 == "fpr") print $10}'
+ key2_sub2_fpr=7536E948EC58972D5B13C42CC98EB3524FA3BC24
+ ostree --repo=/var/tmp/tap-test.RUfrYl/repo commit -b test2 -s 'A GPG signed 
commit' -m 'Signed commit body' --tree=dir=files 
--gpg-homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --gpg-sign=A25C19F9E5613671 
--gpg-sign=C98EB3524FA3BC24
+ ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2
+ assert_file_has_content test2-show '^Found 2 signatures'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e '^Found 2 signatures' test2-show
+ assert_file_has_content test2-show A25C19F9E5613671
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e A25C19F9E5613671 test2-show
+ assert_file_has_content test2-show C98EB3524FA3BC24
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e C98EB3524FA3BC24 test2-show
+ assert_file_has_content test2-show 'Good signature from "Test Key 1 <>"'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Good signature from "Test Key 1 <>"' test2-show
+ assert_file_has_content test2-show 'public key not found'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'public key not found' test2-show
+ echo 'ok verified with key2 sub2 missing'
+ 
key1_rev=/var/tmp/tap-test.RUfrYl/tmpgpghome/openpgp-revocs.d/AADA0A6CAD88352E79D0AEB2A25C19F9E5613671.rev
+ '[' -f 
/var/tmp/tap-test.RUfrYl/tmpgpghome/openpgp-revocs.d/AADA0A6CAD88352E79D0AEB2A25C19F9E5613671.rev
 ']'
+ sed -i '/BEGIN PGP PUBLIC KEY BLOCK/s/^://' 
/var/tmp/tap-test.RUfrYl/tmpgpghome/openpgp-revocs.d/AADA0A6CAD88352E79D0AEB2A25C19F9E5613671.rev
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --import 
/var/tmp/tap-test.RUfrYl/tmpgpghome/openpgp-revocs.d/AADA0A6CAD88352E79D0AEB2A25C19F9E5613671.rev
gpg: key A25C19F9E5613671: "Test Key 1" revocation certificate imported
gpg: Total number processed: 1
gpg:    new key revocations: 1
gpg: marginals needed: 3  completes needed: 1  trust model: pgp
gpg: depth: 0  valid:   2  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 2u
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --export A25C19F9E5613671 
4983E32424B34CD8
+ ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2
+ assert_file_has_content test2-show '^Found 2 signatures'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e '^Found 2 signatures' test2-show
+ assert_not_file_has_content test2-show 'public key not found'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'public key not found' test2-show
+ assert_file_has_content test2-show A25C19F9E5613671
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e A25C19F9E5613671 test2-show
+ assert_file_has_content test2-show C98EB3524FA3BC24
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e C98EB3524FA3BC24 test2-show
+ assert_file_has_content test2-show 'Key revoked'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Key revoked' test2-show
+ assert_file_has_content test2-show 'Good signature from "Test Key 2 <>"'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Good signature from "Test Key 2 <>"' test2-show
+ assert_file_has_content test2-show 'Primary key ID 4983E32424B34CD8'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Primary key ID 4983E32424B34CD8' test2-show
+ echo 'ok verified with key1 revoked'
+ run_exit_cmds
+ for expr in "${libtest_exit_cmds[@]}"
+ eval save_core
++ save_core
++ '[' -e core ']'
+ for expr in "${libtest_exit_cmds[@]}"
+ eval libtest_cleanup_gpg
++ libtest_cleanup_gpg
++ local gpg_homedir=/var/tmp/tap-test.RUfrYl/gpghome
++ gpg-connect-agent --homedir /var/tmp/tap-test.RUfrYl/gpghome killagent /bye
+ for expr in "${libtest_exit_cmds[@]}"
+ eval cleanup_tmpgpg_home
++ cleanup_tmpgpg_home
++ libtest_cleanup_gpg /var/tmp/tap-test.RUfrYl/tmpgpghome
++ local gpg_homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome
++ gpg-connect-agent --homedir /var/tmp/tap-test.RUfrYl/tmpgpghome killagent 
/bye
Copying gpghome to /var/tmp/tap-test.RUfrYl
checking for xattrs.../usr/bin/setfattr
/var/tmp/tap-test.RUfrYl /var/tmp/tap-test.RUfrYl
Unable to retrieve SELinux label, assuming disabled
/var/tmp/tap-test.RUfrYl
done
checking for overlayfs whiteouts...done
1..9
e58b9c623799b28fde9bedc3e73628ba51ff73ade651e8bd270ef03d95715f12
08bf7d4b75b61a507b57db922191de303a5a3c8aa6806be3baf9c65cc3292331
fsck objects (1/23) 4%
fsck objects (23/23) 100%
object fsck of 2 commits completed successfully - no errors found.
d505505b44ce9b66b7ff7bf5bdd08493aaaed087720a73e92cbba96ac16472a7
b9ff7e879fffb6e591fa3e49b0d863399ee969d3ee13b4af952569e249344384
14946aa17d545a0616549de698adc78a7ff7cd7791fcfded69e1ec9f33cc2a3a
ok
PASS: tests/test-gpg-signed-commit.sh 1
5cc11b25806d66ee3dd3a432908387b9512bf3c57a86958004cc45235859c817
ok signed with both generated keys
PASS: tests/test-gpg-signed-commit.sh 2 signed with both generated keys
ok verified both generated keys
PASS: tests/test-gpg-signed-commit.sh 3 verified both generated keys
ok verified with key1 expired
PASS: tests/test-gpg-signed-commit.sh 4 verified with key1 expired
ok verified with key2 primary expired
PASS: tests/test-gpg-signed-commit.sh 5 verified with key2 primary expired
ok # SKIP gpg --quick-set-expire does not support expiring subkeys
SKIP: tests/test-gpg-signed-commit.sh 6 # SKIP gpg --quick-set-expire does not 
support expiring subkeys
ok # SKIP gpg --quick-set-expire does not support expiring subkeys
SKIP: tests/test-gpg-signed-commit.sh 7 # SKIP gpg --quick-set-expire does not 
support expiring subkeys
a1da9987eaeb94ba2a317cd6b1539e40ff04a9a04d4b39e89042a6ae98effe3f
ok verified with key2 sub2 missing
PASS: tests/test-gpg-signed-commit.sh 8 verified with key2 sub2 missing
ok verified with key1 revoked
PASS: tests/test-gpg-signed-commit.sh 9 verified with key1 revoked
OK closing connection
OK closing connection

SKIP: tests/test-rofiles-fuse.sh
================================

# testlabel.txt: security.selinux: No such attribute
++ BUILT_WITH_ASAN=
++ test -n ''
++ CMD_PREFIX=
++ test -n ''
++ test -z ''
++ OSTREE_HTTPD=/<<PKGBUILDDIR>>/ostree-trivial-httpd
++ '[' -x /<<PKGBUILDDIR>>/ostree-trivial-httpd ']'
++ _have_user_xattrs=
++ _have_systemd_and_libmount=
++ _have_strace_fault_injection=
++ libtest_exit_cmds+=(libtest_cleanup_gpg)
++ ED25519PUBLIC=
++ ED25519SEED=
++ ED25519SECRET=
+ skip_without_fuse
+ fusermount --version
+ grep -q 'Bounding set.*[^a-z]cap_sys_admin'
+ capsh --print
/<<PKGBUILDDIR>>/tests/libtest.sh: line 692: capsh: command not found
+ skip 'No cap_sys_admin in bounding set, can'\''t use FUSE'
+ echo '1..0 # SKIP' 'No cap_sys_admin in bounding set, can'\''t use FUSE'
+ exit 0
+ run_exit_cmds
+ for expr in "${libtest_exit_cmds[@]}"
+ eval save_core
++ save_core
++ '[' -e core ']'
+ for expr in "${libtest_exit_cmds[@]}"
+ eval libtest_cleanup_gpg
++ libtest_cleanup_gpg
++ local gpg_homedir=/var/tmp/tap-test.FPEM7a/gpghome
++ gpg-connect-agent --homedir /var/tmp/tap-test.FPEM7a/gpghome killagent /bye
gpg-connect-agent: no running gpg-agent - starting '/usr/bin/gpg-agent'
gpg-connect-agent: waiting for the agent to come up ... (5s)
gpg-connect-agent: connection to agent established
Copying gpghome to /var/tmp/tap-test.FPEM7a
checking for xattrs.../usr/bin/setfattr
/var/tmp/tap-test.FPEM7a /var/tmp/tap-test.FPEM7a
Unable to retrieve SELinux label, assuming disabled
/var/tmp/tap-test.FPEM7a
done
checking for overlayfs whiteouts...done
1..0 # SKIP No cap_sys_admin in bounding set, can't use FUSE
SKIP: tests/test-rofiles-fuse.sh - No cap_sys_admin in bounding set, can't use 
FUSE
OK closing connection

SKIP: tests/coccinelle.sh
=========================

# testlabel.txt: security.selinux: No such attribute
++ BUILT_WITH_ASAN=
++ test -n ''
++ CMD_PREFIX=
++ test -n ''
++ test -z ''
++ OSTREE_HTTPD=/<<PKGBUILDDIR>>/ostree-trivial-httpd
++ '[' -x /<<PKGBUILDDIR>>/ostree-trivial-httpd ']'
++ _have_user_xattrs=
++ _have_systemd_and_libmount=
++ _have_strace_fault_injection=
++ libtest_exit_cmds+=(libtest_cleanup_gpg)
++ ED25519PUBLIC=
++ ED25519SEED=
++ ED25519SECRET=
+ spatch --version
+ skip 'no spatch; get it from http://coccinelle.lip6.fr/'
+ echo '1..0 # SKIP' 'no spatch; get it from http://coccinelle.lip6.fr/'
+ exit 0
+ run_exit_cmds
+ for expr in "${libtest_exit_cmds[@]}"
+ eval save_core
++ save_core
++ '[' -e core ']'
+ for expr in "${libtest_exit_cmds[@]}"
+ eval libtest_cleanup_gpg
++ libtest_cleanup_gpg
++ local gpg_homedir=/var/tmp/tap-test.dDVgxE/gpghome
++ gpg-connect-agent --homedir /var/tmp/tap-test.dDVgxE/gpghome killagent /bye
gpg-connect-agent: no running gpg-agent - starting '/usr/bin/gpg-agent'
gpg-connect-agent: waiting for the agent to come up ... (5s)
gpg-connect-agent: connection to agent established
Copying gpghome to /var/tmp/tap-test.dDVgxE
checking for xattrs.../usr/bin/setfattr
/var/tmp/tap-test.dDVgxE /var/tmp/tap-test.dDVgxE
Unable to retrieve SELinux label, assuming disabled
/var/tmp/tap-test.dDVgxE
done
checking for overlayfs whiteouts...done
1..0 # SKIP no spatch; get it from http://coccinelle.lip6.fr/
SKIP: tests/coccinelle.sh - no spatch; get it from http://coccinelle.lip6.fr/
OK closing connection

============================================================================
Testsuite summary for libostree 2024.8
============================================================================
# TOTAL: 960
# PASS:  912
# SKIP:  46
# XFAIL: 0
# FAIL:  0
# XPASS: 0
# ERROR: 2
============================================================================
See ./test-suite.log
Please report to [email protected]
============================================================================
make[6]: *** [Makefile:8284: test-suite.log] Error 1
make[6]: Leaving directory '/<<PKGBUILDDIR>>'
make[5]: *** [Makefile:8392: check-TESTS] Error 2
make[5]: Leaving directory '/<<PKGBUILDDIR>>'
make[4]: *** [Makefile:9615: check-am] Error 2
make[4]: Leaving directory '/<<PKGBUILDDIR>>'
make[3]: *** [Makefile:8169: check-recursive] Error 1
make[3]: Leaving directory '/<<PKGBUILDDIR>>'
make[2]: *** [Makefile:9618: check] Error 2
make[2]: Leaving directory '/<<PKGBUILDDIR>>'
make[1]: *** [debian/rules:64: override_dh_auto_test-arch] Error 1
make[1]: Leaving directory '/<<PKGBUILDDIR>>'
make: *** [debian/rules:8: binary] Error 2
dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2
--------------------------------------------------------------------------------

The above is just how the build ends and not necessarily the most relevant part.
If required, the full build log is available here:

https://people.debian.org/~sanvila/build-logs/202410/

About the archive rebuild: The build was made on virtual machines from AWS,
using sbuild and a reduced chroot with only build-essential packages.

If you could not reproduce the bug please contact me privately, as I
am willing to provide ssh access to a virtual machine where the bug is
fully reproducible.

If this is really a bug in one of the build-depends, please use
reassign and affects, so that this is still visible in the BTS web
page for this package.

Thanks.

--- End Message ---
--- Begin Message ---
On Wed, 30 Oct 2024 at 22:39:02 +0100, Santiago Vila wrote:
> During a rebuild of all packages in unstable, your package failed to build

This is the same FTBFS as #1086140 (which already has an affects on
src:ostree), we don't need a second bug number for this.

    smcv

--- End Message ---
_______________________________________________
Pkg-utopia-maintainers mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-utopia-maintainers

Reply via email to