[Bug 1959855] Re: FTBFS against openssl 3

2022-02-04 Thread Simon Chopin
** Changed in: validns (Ubuntu)
 Assignee: (unassigned) => Simon Chopin (schopin)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959855

Title:
  FTBFS against openssl 3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/validns/+bug/1959855/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959421] Re: [22.04 FEAT] Upgrade libica to latest version (crypto) (v4.0)

2022-02-04 Thread Simon Chopin
Currently waiting for https://bugs.launchpad.net/bugs/1960004 to be
fixed before uploading libica, the new openssl-ibmca and a rebuild of
opencryptoki.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959421

Title:
  [22.04 FEAT] Upgrade libica to latest version (crypto) (v4.0)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959421/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959855] Re: FTBFS against openssl 3

2022-02-03 Thread Simon Chopin
** Tags added: transition-openssl3-jj

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959855

Title:
  FTBFS against openssl 3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/validns/+bug/1959855/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959421] Re: [22.04 FEAT] Upgrade libica to latest version (crypto) (v4.0)

2022-02-03 Thread Simon Chopin
** Changed in: libica (Ubuntu)
 Assignee: Frank Heimes (fheimes) => Simon Chopin (schopin)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959421

Title:
  [22.04 FEAT] Upgrade libica to latest version (crypto) (v4.0)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959421/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957932] Re: [MIR] rustc, cargo

2022-02-01 Thread Simon Chopin
** Description changed:

  [Availability]
  The packages rustc and cargo are already in Ubuntu universe.
  The packages build for the architectures they are designed to work on,
  and are also built on platform with lesser upstream support, see
  https://doc.rust-lang.org/nightly/rustc/platform-support.html for details.
  
  They currently build and works for architectures:
    * amd64
    * arm64
    * armhf
    * i386
    * ppc64el
    * riscv64
    * s390x
  
  Link to packages:
  https://launchpad.net/ubuntu/+source/rustc
  https://launchpad.net/ubuntu/+source/cargo
  
  [Rationale]
  The packages rustc and cargo are required in Ubuntu main as the Rust 
programming
  language is gaining in popularity, and those two packages are, respectively, 
its
  main compiler implementation and its dedicated build tool (and dependency 
manager).
  
  There are a few packages in main already that have partially switched to Rust
  as their implementation language, and so rustc and cargo will be needed to 
keep
  us in sync with their upstream. See for instance
  https://bugs.launchpad.net/ubuntu/+source/mdevctl/+bug/1942394 and
  https://lists.debian.org/debian-python/2021/12/msg0.html
  (python-cryptography is in main)
  
  Note that the huge majority of our users will not use these packages, their
  purpose is to be a build-dependency for other packages. In particular, it is
  not particularly expected at this stage that those of our users that are Rust
  developers, which usually rely on their toolchain being managed in their $HOME
  by the `rustup` tool.
  
  [Security]
  cargo and rustc had 19 recorded security issues in the past, mostly in the 
Rust standard library
  (1 affecting cargo):
  
  
https://nvd.nist.gov/vuln/search/results?form_type=Advanced_type=overview_type=all=false_vendor=cpe%3A%2F%3Arust-
  lang_product=cpe%3A%2F%3A%3Arust
  
  All issues are usually handled promptly by the Rust team. However, the fixes
  are rarely (if ever) backported to previous releases besides an occasional
  1.X.1 point release for the latest stable.
  
  There is an official Rust Security working group that curates a database of 
security
  issues within the Rust ecosystem, including rustc/cargo:
  
  https://github.com/rustsec/advisory-db
  
  - no `suid` or `sgid` binaries
  - no executables in `/sbin` and `/usr/sbin`
  - Package does not install services, timers or recurring jobs
  - Packages does not open privileged ports (ports < 1024)
  - Packages does not contain extensions to security-sensitive software
  (filters, scanners, plugins, UI skins, ...)
  
  Note however that in typical use, building a project with cargo+rustc involves
  executing code that has been downloaded from crates.io: cargo builds and 
executes
  the `build.rs` file for any pre-compilation task (a bit like a Makefile), and 
any use
  of a proc macro dependency basically implies running arbitrary code (the 
macro) within
  the execution context of rustc.
  
  [Quality assurance - function/usage]
  The packages work well right after install, one can easily create a simple 
Rust project
  and run it.
  
  [Quality assurance - maintenance]
  The packages do not deal with exotic hardware we cannot support
  
  [Quality assurance - testing]
  The packages both run a test suite on build time. However, the rustc test 
suite
- does NOT make the build fail.
- 
- TODO: check with mwhudson *why*?
+ does NOT make the build fail. The reason is that there are always a few tests 
that fail, and it was a tradeoff made due to limited resources. Please note 
that Debian has a strategy of only failing the build if there are *too many* 
errors. As the Foundations team commits more resources on this toolchain, this 
policy will probably be revisited.
  
  Neither package has any autopkgtests.
  
  TODO: cargo autopkgtest that creates a new crate, adds a simple dependency
  (anyhow is a good candidate, no transitive deps), vendors it, builds the 
binary
  from the vendored crate, and runs it.
  
  [Quality assurance - packaging]
  debian/watch is present and works
  
  rustc yields quite a bit of lintian output, but they seem mostly harmless.
  https://lintian.debian.org/sources/rustc
  
  There are lintian overrides present, but those are usually justified in the 
override
  files themselves.
  
  cargo is a bit more tame on the warning fronts
  https://lintian.debian.org/sources/cargo
  
  It has an override file for the source package, for relatively minor
  warnings.
  
  These packages does not rely on obsolete or about to be demoted
  packages.
  
  The packages will not be installed by default
  
  The packaging is fairly complex, especially in the case of rustc. The crux of
  the complexity can be attributed to the boostrapping issue, as well as the 
need
  to deal with vendored dependencies. There is extensive documentation within 
the
  debian/ directories to help with the difficulties, and a lot of things have 
been
  automated in scripts living in 

[Bug 1959315] Re: autopackage tests fail

2022-02-01 Thread Simon Chopin
Uploaded. I took the liberty of adding a line to the changelog to
mention the dropped patch.

** Changed in: aiocoap (Ubuntu)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959315

Title:
  autopackage tests fail

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/aiocoap/+bug/1959315/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959622] Re: FTBFS against openssl 3.0

2022-02-01 Thread Simon Chopin
Uploaded, thanks!

** Changed in: hydra (Ubuntu)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959622

Title:
  FTBFS against openssl 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/hydra/+bug/1959622/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959315] Re: autopackage tests fail

2022-02-01 Thread Simon Chopin
** Changed in: aiocoap (Ubuntu)
 Assignee: (unassigned) => Simon Chopin (schopin)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959315

Title:
  autopackage tests fail

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/aiocoap/+bug/1959315/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959622] Re: FTBFS against openssl 3.0

2022-02-01 Thread Simon Chopin
** Changed in: hydra (Ubuntu)
 Assignee: (unassigned) => Simon Chopin (schopin)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959622

Title:
  FTBFS against openssl 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/hydra/+bug/1959622/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959572] Re: glirc: FTBFS against OpenSSL 3.0

2022-01-31 Thread Simon Chopin
After a discussion with a member of the Debian Haskell team, the
simplest solution is to backport the OpenSSL 3.0 patch from upstream.

** Changed in: haskell-hsopenssl (Ubuntu)
   Status: New => Fix Committed

** Changed in: glirc (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959572

Title:
  glirc: FTBFS against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glirc/+bug/1959572/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959572] [NEW] glirc: FTBFS against OpenSSL 3.0

2022-01-31 Thread Simon Chopin
Public bug reported:

The package fails to build against OpenSSL 3.0, due to lack of support
in the Haskell package haskell-hlopenssl.

** Affects: glirc (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: haskell-hsopenssl (Ubuntu)
 Importance: Undecided
 Status: Fix Committed


** Tags: transiton-openssl3-jj

** Also affects: haskell-hsopenssl (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959572

Title:
  glirc: FTBFS against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glirc/+bug/1959572/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959426] [NEW] lua-luaossl: FTBFS against OpenSSL 3.0

2022-01-28 Thread Simon Chopin
Public bug reported:

This package fails to build against OpenSSL 3.0, as it uses constants
that are no longer defined in OpenSSL 3.0.

I'll upload a version where those values aren't exported at all, as a
search through codesearch.debian.net didn't turn up any usage for them
in the archive.

** Affects: lua-luaossl (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: transition-openssl3-jj

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959426

Title:
  lua-luaossl: FTBFS against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lua-luaossl/+bug/1959426/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959414] [NEW] Please remove tpm2-tss-engine from Jammy

2022-01-28 Thread Simon Chopin
Public bug reported:

This package isn't intended to work with OpenSSL 3.0, and should thus be
removed from Jammy since we're aiming for libssl 1.1 removal.

It has no reverse-dependencies:

❯ reverse-depends  src:tpm2-tss-engine -a source
No reverse dependencies found
❯ reverse-depends  src:tpm2-tss-engine  
No reverse dependencies found

** Affects: tpm2-tss-engine (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959414

Title:
  Please remove tpm2-tss-engine from Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tpm2-tss-engine/+bug/1959414/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1958090] Re: Kate: navigation keys do not cancel mark

2022-01-27 Thread Simon Chopin
Allright, I uploaded the package to Jammy. Thanks!

** Changed in: ktexteditor (Ubuntu)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1958090

Title:
   Kate: navigation keys do not cancel mark

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ktexteditor/+bug/1958090/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1958090] Re: Kate: navigation keys do not cancel mark

2022-01-27 Thread Simon Chopin
** Changed in: ktexteditor (Ubuntu)
 Assignee: Heinrich Schuchardt (xypron) => Simon Chopin (schopin)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1958090

Title:
   Kate: navigation keys do not cancel mark

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ktexteditor/+bug/1958090/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1958090] Re: Kate: navigation keys do not cancel mark

2022-01-26 Thread Simon Chopin
Technically, this fix breaks the ABI of libkf5texteditor5 since the
patch removes a public symbol. This isn't a huge issue since the symbol
has never been present in a released version of Ubuntu, but could you
check that nothing in the archive uses it? I believe *someone* in
#ubuntu-release has some tooling to check the sources for the entire
archive.

You might also want to check in with the Kubuntu folks.

** Changed in: ktexteditor (Ubuntu)
 Assignee: Simon Chopin (schopin) => Heinrich Schuchardt (xypron)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1958090

Title:
   Kate: navigation keys do not cancel mark

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ktexteditor/+bug/1958090/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1958090] Re: Kate: navigation keys do not cancel mark

2022-01-26 Thread Simon Chopin
** Changed in: ktexteditor (Ubuntu)
 Assignee: Heinrich Schuchardt (xypron) => Simon Chopin (schopin)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1958090

Title:
   Kate: navigation keys do not cancel mark

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ktexteditor/+bug/1958090/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959095] [NEW] breezy FTBFS due to deprecation warning in paramiko

2022-01-26 Thread Simon Chopin
Public bug reported:

The version in -proposed currently FTBFS because of some deprecation
warnings introduced in Python3.10 raised by code in paramiko.

** Affects: breezy (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: paramiko (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: ftbfs update-excuse

** Patch added: "paramiko.debdiff"
   
https://bugs.launchpad.net/bugs/1959095/+attachment/5557602/+files/paramiko.debdiff

** Also affects: paramiko (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959095

Title:
  breezy FTBFS due to deprecation warning in paramiko

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/breezy/+bug/1959095/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959095] Re: breezy FTBFS due to deprecation warning in paramiko

2022-01-26 Thread Simon Chopin
Above is a patch for paramiko. Note that this transitively blocks
lintian from migrating to the release pocket.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959095

Title:
  breezy FTBFS due to deprecation warning in paramiko

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/breezy/+bug/1959095/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959002] Re: Blacklist and remove lintian-brush from the archive

2022-01-26 Thread Simon Chopin
For the record, my request originated from the recurrence of lintian-
brush in update-excuses, as was noted in this comment:

https://lists.ubuntu.com/archives/ubuntu-devel/2021-December/041754.html

Regarding the rdeps:
To be noted, both silver-platter and routine-update have no further rdeps:

❯ reverse-depends src:silver-platter

❯ reverse-depends -a source src:silver-platter
No reverse dependencies found

❯ reverse-depends src:routine-update
No reverse dependencies found

❯ reverse-depends -a source routine-update
No reverse dependencies found

routine-update appears functional on a typical Salsa repository, but chokes 
with repositories managed by git-ubuntu.
silverplatter uses lintian-brush in its debian-svp variant, which presumably 
has the same shortcomings than routine-update. I didn't test it out, though.
Both tools are thus probably not that useful in typical Ubuntu work, being more 
suited for direct Debian contributions, and should be removed alongside 
lintian-brush as the latter gives us the bulk of the interesting features.

HOWEVER

I looked a bit closer into lintian-brush code as well as its history in
various +1 maintenance reports, and it seems most of its issues are
related to src:breezy or the Python transition. The code is in good
shape, and isn't as tied to lintian internals as I feared.

For reference, here are the rdeps of src:breezy:

❯ reverse-depends src:breezy
Reverse-Recommends
* ikiwiki   (for brz)
* silver-platter(for brz)
* ubuntu-dev-tools  (for brz)

Reverse-Depends
* brz-debian(for brz)
* brz-debian(for python3-breezy)
* bzr   (for brz)
* bzr-doc   (for brz-doc)
* bzr-email (for brz)
* bzr-fastimport(for brz)
* bzr-git   (for brz)
* bzr-stats (for brz)
* bzr-upload(for brz)
* bzrtools  (for brz)
* etckeeper (for brz)
* lintian-brush (for python3-breezy)
* loggerhead(for python3-breezy)
* lptools   (for python3-breezy)
* qbrz  (for python3-breezy)
* silver-platter(for python3-breezy)

After investigating, I'm less inclined to remove the package from the
archive, as it's more of a symptom of an issue with src:breezy.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959002

Title:
  Blacklist and remove lintian-brush from the archive

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lintian-brush/+bug/1959002/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1955009] Re: Freeradius 3.0.21+dfsg-3build1 fails test of moonshot-gss-eap

2022-01-25 Thread Simon Chopin
** Tags added: transition-openssl3-jj

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1955009

Title:
  Freeradius 3.0.21+dfsg-3build1 fails test of moonshot-gss-eap

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/freeradius/+bug/1955009/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957932] Re: [MIR] rustc, cargo

2022-01-25 Thread Simon Chopin
** Description changed:

  [Availability]
  The packages rustc and cargo are already in Ubuntu universe.
  The packages build for the architectures they are designed to work on,
  and are also built on platform with lesser upstream support, see
  https://doc.rust-lang.org/nightly/rustc/platform-support.html for details.
  
  They currently build and works for architectures:
    * amd64
    * arm64
    * armhf
    * i386
    * ppc64el
    * riscv64
    * s390x
  
  Link to packages:
  https://launchpad.net/ubuntu/+source/rustc
  https://launchpad.net/ubuntu/+source/cargo
  
  [Rationale]
  The packages rustc and cargo are required in Ubuntu main as the Rust 
programming
  language is gaining in popularity, and those two packages are, respectively, 
its
  main compiler implementation and its dedicated build tool (and dependency 
manager).
  
  There are a few packages in main already that have partially switched to Rust
  as their implementation language, and so rustc and cargo will be needed to 
keep
  us in sync with their upstream. See for instance
  https://bugs.launchpad.net/ubuntu/+source/mdevctl/+bug/1942394 and
  https://lists.debian.org/debian-python/2021/12/msg0.html
  (python-cryptography is in main)
  
  Note that the huge majority of our users will not use these packages, their
  purpose is to be a build-dependency for other packages. In particular, it is
  not particularly expected at this stage that those of our users that are Rust
  developers, which usually rely on their toolchain being managed in their $HOME
  by the `rustup` tool.
  
  [Security]
  cargo and rustc had 19 recorded security issues in the past, mostly in the 
Rust standard library
  (1 affecting cargo):
  
  
https://nvd.nist.gov/vuln/search/results?form_type=Advanced_type=overview_type=all=false_vendor=cpe%3A%2F%3Arust-
  lang_product=cpe%3A%2F%3A%3Arust
  
  All issues are usually handled promptly by the Rust team. However, the fixes
  are rarely (if ever) backported to previous releases besides an occasional
  1.X.1 point release for the latest stable.
  
  There is an official Rust Security working group that curates a database of 
security
  issues within the Rust ecosystem, including rustc/cargo:
  
  https://github.com/rustsec/advisory-db
  
  - no `suid` or `sgid` binaries
  - no executables in `/sbin` and `/usr/sbin`
  - Package does not install services, timers or recurring jobs
  - Packages does not open privileged ports (ports < 1024)
  - Packages does not contain extensions to security-sensitive software
  (filters, scanners, plugins, UI skins, ...)
  
  Note however that in typical use, building a project with cargo+rustc involves
  executing code that has been downloaded from crates.io: cargo builds and 
executes
  the `build.rs` file for any pre-compilation task (a bit like a Makefile), and 
any use
  of a proc macro dependency basically implies running arbitrary code (the 
macro) within
  the execution context of rustc.
  
  [Quality assurance - function/usage]
  The packages work well right after install, one can easily create a simple 
Rust project
  and run it.
  
  [Quality assurance - maintenance]
  The packages do not deal with exotic hardware we cannot support
  
  [Quality assurance - testing]
  The packages both run a test suite on build time. However, the rustc test 
suite
  does NOT make the build fail.
  
  TODO: check with mwhudson *why*?
  
  Neither package has any autopkgtests.
  
  TODO: cargo autopkgtest that creates a new crate, adds a simple dependency
  (anyhow is a good candidate, no transitive deps), vendors it, builds the 
binary
  from the vendored crate, and runs it.
  
  [Quality assurance - packaging]
  debian/watch is present and works
  
  rustc yields quite a bit of lintian output, but they seem mostly harmless.
  https://lintian.debian.org/sources/rustc
  
  There are lintian overrides present, but those are usually justified in the 
override
  files themselves.
  
  cargo is a bit more tame on the warning fronts
  https://lintian.debian.org/sources/cargo
  
  It has an override file for the source package, for relatively minor
  warnings.
  
  These packages does not rely on obsolete or about to be demoted
  packages.
  
  The packages will not be installed by default
  
  The packaging is fairly complex, especially in the case of rustc. The crux of
  the complexity can be attributed to the boostrapping issue, as well as the 
need
  to deal with vendored dependencies. There is extensive documentation within 
the
  debian/ directories to help with the difficulties, and a lot of things have 
been
  automated in scripts living in debian/scripts/*
  
  Note that originally, the upstream tarball for rustc includes the sources for
  cargo as well as its vendored dependencies, but the Debian Rust team chose to
  split it out in its own package.
  
  [UI standards]
  I do not believe there's a need for translation for these applications given 
the
  stated purpose for having them 

[Bug 1959004] Re: lintian: remove unused non-main dependency libio-prompt-tiny-perl

2022-01-25 Thread Simon Chopin
Attached is a debdiff to fix this. The package builds fine and I was
able to run lintian on several .changes files lying around my work
directory without any issue.

** Patch added: "lintian.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1959004/+attachment/5557365/+files/lintian.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959004

Title:
  lintian: remove unused non-main dependency libio-prompt-tiny-perl

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1959004/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959004] [NEW] lintian: remove unused non-main dependency libio-prompt-tiny-perl

2022-01-25 Thread Simon Chopin
Public bug reported:

The 2.111.0 version of lintian depends on libio-prompt-tiny-perl which
is currently in Universe. This blocks the package from migrating until
the MIR is completed. However, this dependency is actually unused in the
binary package, as the scripts that use it aren't shipped yet. I'm
assuming the dependency is there on a provisional basis, but it's
actually blocking for us.

** Affects: lintian (Ubuntu)
 Importance: High
 Status: New


** Tags: update-excuse

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959004

Title:
  lintian: remove unused non-main dependency libio-prompt-tiny-perl

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1959004/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959002] [NEW] Blacklist and remove lintian-brush from the archive

2022-01-25 Thread Simon Chopin
Public bug reported:

Hi,

Would it be possible to remove and blacklist lintian-brush from the
archive? This package isn't useful for Ubuntu, and seems to keep getting
in the way of some transitions, i.e. lintian.

Thanks in advance!

** Affects: lintian-brush (Ubuntu)
 Importance: Wishlist
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959002

Title:
  Blacklist and remove lintian-brush from the archive

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lintian-brush/+bug/1959002/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957100] Re: Merge lintian 2.114.0 from Debian unstable

2022-01-25 Thread Simon Chopin
As usual, you'll find the resulting package uploaded to my PPA:
https://launchpad.net/~schopin/+archive/ubuntu/test-ppa/+sourcepub/13222724/+listing-archive-extra

Just pop the ~ppaX changelog entries, and voilà.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957100

Title:
  Merge lintian 2.114.0 from Debian unstable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957100] Re: Merge lintian 2.114.0 from Debian unstable

2022-01-25 Thread Simon Chopin
Updated debdiff against Ubuntu version.

** Patch added: "lintian_ubuntu.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+attachment/5557293/+files/lintian_ubuntu.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957100

Title:
  Merge lintian 2.114.0 from Debian unstable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957100] Re: Merge lintian 2.114.0 from Debian unstable

2022-01-25 Thread Simon Chopin
Updated debdiff against Debian, with a new change removing an unused,
non-MIRed dependency.

** Patch added: "lintian_debian.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+attachment/5557292/+files/lintian_debian.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957100

Title:
  Merge lintian 2.114.0 from Debian unstable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1946014] Re: ovn: Fail to build against OpenSSL 3.0

2022-01-24 Thread Simon Chopin
I'm guessing this has been solved, since the binaries in the release
pocket are linked against libssl3 :)

** Changed in: ovn (Ubuntu)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1946014

Title:
  ovn: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ovn/+bug/1946014/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1958881] [NEW] Sync erlang 1:24.2+dfsg-1 (main) from Debian unstable (main)

2022-01-24 Thread Simon Chopin
Public bug reported:

Please sync erlang 1:24.2+dfsg-1 (main) from Debian unstable (main)

Explanation of the Ubuntu delta and why it can be dropped:
  * Backport the OpenSSL 3 patchset from upstream (LP: #1945768)

Upstream has OpenSSL 3.0 support from the 24.2 branch onward, see
https://github.com/erlang/otp/releases/tag/OTP-24.2

Our backport patches are thus no longer needed :)

Changelog entries since current jammy version 1:24.1.5+dfsg-1ubuntu1:

erlang (1:24.2+dfsg-1) unstable; urgency=medium

  * New upstream release.
  * Refresh patches.

 -- Sergei Golovan   Wed, 15 Dec 2021 19:39:20
+0300

erlang (1:24.1.7+dfsg-1) unstable; urgency=medium

  * New upstream release.

 -- Sergei Golovan   Fri, 10 Dec 2021 12:51:44
+0300

** Affects: erlang (Ubuntu)
 Importance: Wishlist
 Status: New

** Changed in: erlang (Ubuntu)
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1958881

Title:
  Sync erlang 1:24.2+dfsg-1 (main) from Debian unstable (main)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/erlang/+bug/1958881/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1951065] Re: [MIR] libio-prompt-tiny-perl

2022-01-24 Thread Simon Chopin
I opened a Debian bug here: https://bugs.debian.org/1004286

Note that apparently the scripts with the prompt are not actually
shipped with Lintian just yet, so I might just drop the dependency in
https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100 as a
temporary new delta.

** Bug watch added: Debian Bug tracker #1004286
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004286

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1951065

Title:
  [MIR] libio-prompt-tiny-perl

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libio-prompt-tiny-perl/+bug/1951065/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1958419] Re: [22.04 FEAT] [LDP2025] Upgrade openssl-ibmca to latest version (crypto) (2.2.1)

2022-01-24 Thread Simon Chopin
Uploaded this version with the 3DES-EBC test disabled.

** Changed in: openssl-ibmca (Ubuntu)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1958419

Title:
  [22.04 FEAT] [LDP2025] Upgrade openssl-ibmca to latest version
  (crypto) (2.2.1)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1958419/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1958419] Re: [22.04 FEAT] [LDP2025] Upgrade openssl-ibmca to latest version (crypto) (2.2.1)

2022-01-24 Thread Simon Chopin
OK, so I've managed to fix *most* of the tests, but the 3DES-ECB one
still fails. I'm still investigating it, but the investigation is a bit
slow due to having to go through a PPA every time I change something :)

I'm using https://launchpad.net/~schopin/+archive/ubuntu/test-
ppa/+packages for those following at home.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1958419

Title:
  [22.04 FEAT] [LDP2025] Upgrade openssl-ibmca to latest version
  (crypto) (2.2.1)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1958419/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1958419] Re: [22.04 FEAT] [LDP2025] Upgrade openssl-ibmca to latest version (crypto) (2.2.1)

2022-01-24 Thread Simon Chopin
Nice work. I'll try to fix the tests and fully enable them at build
time, then if I succeed I'll upload the result to the archive. However,
I'd rather not upload a package with known test failures.

** Changed in: openssl-ibmca (Ubuntu)
 Assignee: Frank Heimes (fheimes) => Simon Chopin (schopin)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1958419

Title:
  [22.04 FEAT] [LDP2025] Upgrade openssl-ibmca to latest version
  (crypto) (2.2.1)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1958419/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1958244] [NEW] Sync acl 2.3.1-1 (main) from Debian unstable (main)

2022-01-18 Thread Simon Chopin
Public bug reported:

Please sync acl 2.3.1-1 (main) from Debian unstable (main)

Explanation of the Ubuntu delta and why it can be dropped:
  * No-change rebuild to build packages with zstd compression.
  * Build with -fno-strict-aliasing
  * No-change rebuild to drop the udeb package.

The aliasing issue has been fixed upstream, see
https://git.savannah.nongnu.org/cgit/acl.git/commit/?id=cad5d69545765e00715d0cb0c88a3b4c20a59c1e

Changelog entries since current jammy version 2.2.53-10ubuntu2:

acl (2.3.1-1) unstable; urgency=medium

  * New upstream release.
- Remove upstream patches included in this release.
- Refresh remaining patches.
- Update upstream signing key.
  * Add support for the noudeb build profile.

 -- Guillem Jover   Sun, 29 Aug 2021 16:26:27 +0200

** Affects: acl (Ubuntu)
 Importance: Wishlist
 Status: New

** Changed in: acl (Ubuntu)
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1958244

Title:
  Sync acl 2.3.1-1 (main) from Debian unstable (main)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/acl/+bug/1958244/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957170] Re: libio-socket-ssl-perl depends on obsolete libssl1.1

2022-01-17 Thread Simon Chopin
gregoa uploaded this patch to Debian, and the new version has been
synced over to -proposed. Marking as Fix Committed, unsubscribing
Sponsors.

** Changed in: libio-socket-ssl-perl (Ubuntu)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957170

Title:
  libio-socket-ssl-perl depends on  obsolete libssl1.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libio-socket-ssl-perl/+bug/1957170/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957932] Re: MIR: rustc, cargo

2022-01-14 Thread Simon Chopin
** Changed in: cargo (Ubuntu)
   Status: New => Incomplete

** Changed in: rustc (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957932

Title:
  MIR: rustc, cargo

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cargo/+bug/1957932/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957932] [NEW] MIR: rustc, cargo

2022-01-14 Thread Simon Chopin
Public bug reported:

[Availability]
The packages rustc and cargo are already in Ubuntu universe.
The packages build for the architectures they are designed to work on,
and are also built on platform with lesser upstream support, see
https://doc.rust-lang.org/nightly/rustc/platform-support.html for details.

They currently build and works for architectures:
  * amd64
  * arm64
  * armhf
  * i386
  * ppc64el
  * riscv64
  * s390x

Link to packages:
https://launchpad.net/ubuntu/+source/rustc
https://launchpad.net/ubuntu/+source/cargo

[Rationale]
The packages rustc and cargo are required in Ubuntu main as the Rust programming
language is gaining in popularity, and those two packages are, respectively, its
main compiler implementation and its dedicated build tool (and dependency 
manager).

There are a few packages in main already that have partially switched to Rust
as their implementation language, and so rustc and cargo will be needed to keep
us in sync with their upstream. See for instance
https://bugs.launchpad.net/ubuntu/+source/mdevctl/+bug/1942394 and
https://lists.debian.org/debian-python/2021/12/msg0.html
(python-cryptography is in main)

Note that the huge majority of our users will not use these packages, their
purpose is to be a build-dependency for other packages. In particular, it is
not particularly expected at this stage that those of our users that are Rust
developers, which usually rely on their toolchain being managed in their $HOME
by the `rustup` tool.

[Security]
cargo and rustc had 19 recorded security issues in the past, mostly in the Rust 
standard library
(1 affecting cargo):

https://nvd.nist.gov/vuln/search/results?form_type=Advanced_type=overview_type=all=false_vendor=cpe%3A%2F%3Arust-
lang_product=cpe%3A%2F%3A%3Arust

All issues are usually handled promptly by the Rust team. However, the fixes
are rarely (if ever) backported to previous releases besides an occasional
1.X.1 point release for the latest stable.

There is an official Rust Security working group that curates a database of 
security
issues within the Rust ecosystem, including rustc/cargo:

https://github.com/rustsec/advisory-db

- no `suid` or `sgid` binaries
- no executables in `/sbin` and `/usr/sbin`
- Package does not install services, timers or recurring jobs
- Packages does not open privileged ports (ports < 1024)
- Packages does not contain extensions to security-sensitive software
(filters, scanners, plugins, UI skins, ...)

Note however that in typical use, building a project with cargo+rustc involves
executing code that has been downloaded from crates.io: cargo builds and 
executes
the `build.rs` file for any pre-compilation task (a bit like a Makefile), and 
any use
of a proc macro dependency basically implies running arbitrary code (the macro) 
within
the execution context of rustc.

[Quality assurance - function/usage]
The packages work well right after install, one can easily create a simple Rust 
project
and run it.

[Quality assurance - maintenance]
The packages do not deal with exotic hardware we cannot support

[Quality assurance - testing]
The packages both run a test suite on build time. However, the rustc test suite
does NOT make the build fail.

TODO: check with mwhudson *why*?

Neither package has any autopkgtests.

TODO: cargo autopkgtest that creates a new crate, adds a simple dependency
(anyhow is a good candidate, no transitive deps), vendors it, builds the binary
from the vendored crate, and runs it.

[Quality assurance - packaging]
debian/watch is present and works

rustc yields quite a bit of lintian output, but they seem mostly harmless.
https://lintian.debian.org/sources/rustc

There are lintian overrides present, but those are usually justified in the 
override
files themselves.

cargo is a bit more tame on the warning fronts
https://lintian.debian.org/sources/cargo

It has an override file for the source package, for relatively minor
warnings.

These packages does not rely on obsolete or about to be demoted
packages.

The packages will not be installed by default

The packaging is fairly complex, especially in the case of rustc. The crux of
the complexity can be attributed to the boostrapping issue, as well as the need
to deal with vendored dependencies. There is extensive documentation within the
debian/ directories to help with the difficulties, and a lot of things have been
automated in scripts living in debian/scripts/*

Note that originally, the upstream tarball for rustc includes the sources for
cargo as well as its vendored dependencies, but the Debian Rust team chose to
split it out in its own package.

[UI standards]
I do not believe there's a need for translation for these applications given the
stated purpose for having them in main.

[Dependencies]
The packages have quite a few vendored dependencies. However, their non-vendored
dependencies are all in main, as well as the build-dependencies, assuming for 
the purpose
of this analysis that src:rustc is in main.


[Bug 1956796] Re: FTBFS against sqlite3 3.37 or newer

2022-01-13 Thread Simon Chopin
Uploaded, thanks!

** Changed in: ruby-sqlite3 (Ubuntu)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1956796

Title:
  FTBFS against sqlite3 3.37 or newer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ruby-sqlite3/+bug/1956796/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1956796] Re: FTBFS against sqlite3 3.37 or newer

2022-01-13 Thread Simon Chopin
** Changed in: ruby-sqlite3 (Ubuntu)
   Importance: Undecided => High

** Changed in: ruby-sqlite3 (Ubuntu)
 Assignee: (unassigned) => Simon Chopin (schopin)

** Changed in: ruby-sqlite3 (Ubuntu)
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1956796

Title:
  FTBFS against sqlite3 3.37 or newer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ruby-sqlite3/+bug/1956796/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1956798] Re: FTBFS against sqlite3 3.37 or newer

2022-01-13 Thread Simon Chopin
Uploaded, thanks for the patch!

** Changed in: restfuldb (Ubuntu)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1956798

Title:
  FTBFS against sqlite3 3.37 or newer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/restfuldb/+bug/1956798/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1956798] Re: FTBFS against sqlite3 3.37 or newer

2022-01-13 Thread Simon Chopin
** Changed in: restfuldb (Ubuntu)
 Assignee: (unassigned) => Simon Chopin (schopin)

** Changed in: restfuldb (Ubuntu)
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1956798

Title:
  FTBFS against sqlite3 3.37 or newer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/restfuldb/+bug/1956798/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957815] [NEW] xml-security-c: tests fail due to using RSA_get0_key on EVP-generated key

2022-01-13 Thread Simon Chopin
Public bug reported:

This deprecated API is not usable on RSA keys that have been generated
using the high-level APIs, always returning NULL instead. This makes the
test suite crash.

Fixing this is non-trivial as the RSA* is part of the lib ABI.

** Affects: xml-security-c (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: transition-openssl3-jj update-excuse

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957815

Title:
  xml-security-c: tests fail due to using RSA_get0_key on EVP-generated
  key

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xml-security-c/+bug/1957815/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957170] Re: libio-socket-ssl-perl depends on obsolete libssl1.1

2022-01-12 Thread Simon Chopin
Attached is a patch removing the hard-coded dependency. A fixed package
has also been uploaded to a PPA (just pop the last changelog entry):
https://launchpad.net/~schopin/+archive/ubuntu/test-
ppa/+sourcepub/13196884/+listing-archive-extra

** Patch added: "libio-socket-ssl-perl.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/libio-socket-ssl-perl/+bug/1957170/+attachment/5553554/+files/libio-socket-ssl-perl.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957170

Title:
  libio-socket-ssl-perl depends on  obsolete libssl1.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libio-socket-ssl-perl/+bug/1957170/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957170] [NEW] libio-socket-ssl-perl depends on obsolete libssl1.1

2022-01-12 Thread Simon Chopin
Public bug reported:

The package declares an explicit dependency on libssl1.1, which we don't
really want since we're transitioning to OpenSSL 3.0

** Affects: libio-socket-ssl-perl (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: transition-openssl3-jj

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957170

Title:
  libio-socket-ssl-perl depends on  obsolete libssl1.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libio-socket-ssl-perl/+bug/1957170/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957166] Re: xmltooling: FTBFS against OpenSSL 3.0

2022-01-12 Thread Simon Chopin
** Changed in: xmltooling (Ubuntu)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957166

Title:
  xmltooling: FTBFS against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xmltooling/+bug/1957166/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957166] [NEW] xmltooling: FTBFS against OpenSSL 3.0

2022-01-12 Thread Simon Chopin
Public bug reported:

The package fails to build, the test run fails.

The issue comes from the xmltoolingtest/data/test.pfx certificate that
contains data encrypted using RC2, which is disabled by default in
OpenSSL 3.0. It could be re-enabled using the legacy provider, but I'd
rather upgrade the certificate to use a supported algorithm.

Converting the algorithm can be done via these simple steps (using an
intermediary file because piping doesn't seem to work...)

openssl pkcs12 -in xmltoolingtest/data/test.pfx -passin pass:password -out 
cert.pem -nodes
openssl pkcs12 -export -descert -out xmltoolingtest/data/test.pfx -passout 
pass:password -in cert.pem
rm cert.pem

(note that if using OpenSSL 3.0 you'll need to add `-provider default
-provider legacy` to the first command in order to decode the original
file)

** Affects: xmltooling (Ubuntu)
 Importance: High
 Status: New


** Tags: ftbfs transition-openssl3-jj

** Description changed:

  The package fails to build, the test run fails.
  
  The issue comes from the xmltoolingtest/data/test.pfx certificate that
  contains data encrypted using RC2, which is disabled by default in
  OpenSSL 3.0. It could be re-enabled using the legacy provider, but I'd
  rather upgrade the certificate to use a supported algorithm.
  
  Converting the algorithm can be done via these simple steps (using an
  intermediary file because piping doesn't seem to work...)
  
- openssl pkcs12 -provider default -provider legacy -in 
xmltoolingtest/data/test.pfx -passin pass:password -out cert.pem -nodes
+ openssl pkcs12 -in xmltoolingtest/data/test.pfx -passin pass:password -out 
cert.pem -nodes
  openssl pkcs12 -export -out xmltoolingtest/data/test.pfx -passout 
pass:password -in cert.pem
  rm cert.pem
  
  (note that if using OpenSSL 3.0 you'll need to add `-provider default
  -provider legacy` to the first command in order to decode the original
  file)

** Description changed:

  The package fails to build, the test run fails.
  
  The issue comes from the xmltoolingtest/data/test.pfx certificate that
  contains data encrypted using RC2, which is disabled by default in
  OpenSSL 3.0. It could be re-enabled using the legacy provider, but I'd
  rather upgrade the certificate to use a supported algorithm.
  
  Converting the algorithm can be done via these simple steps (using an
  intermediary file because piping doesn't seem to work...)
  
  openssl pkcs12 -in xmltoolingtest/data/test.pfx -passin pass:password -out 
cert.pem -nodes
- openssl pkcs12 -export -out xmltoolingtest/data/test.pfx -passout 
pass:password -in cert.pem
+ openssl pkcs12 -export -descert -out xmltoolingtest/data/test.pfx -passout 
pass:password -in cert.pem
  rm cert.pem
  
  (note that if using OpenSSL 3.0 you'll need to add `-provider default
  -provider legacy` to the first command in order to decode the original
  file)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957166

Title:
  xmltooling: FTBFS against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xmltooling/+bug/1957166/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957100] Re: Merge lintian 2.114.0 from Debian unstable

2022-01-11 Thread Simon Chopin
** Summary changed:

- Merge lintian 2.114.0 from Debian uinstable
+ Merge lintian 2.114.0 from Debian unstable

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957100

Title:
  Merge lintian 2.114.0 from Debian unstable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957100] Re: Merge lintian 2.114.0 from Debian uinstable

2022-01-11 Thread Simon Chopin
** Patch added: "lintian_debian.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+attachment/5553374/+files/lintian_debian.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957100

Title:
  Merge lintian 2.114.0 from Debian uinstable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957100] Re: Merge lintian 2.114.0 from Debian uinstable

2022-01-11 Thread Simon Chopin
Attached are debdiffs against the current Ubuntu version 2.111.0ubuntu2
and the Debian version 2.114.0. You can also find a built version there:
https://launchpad.net/~schopin/+archive/ubuntu/test-
ppa/+sourcepub/13195421/+listing-archive-extra (just pop the PPA-related
changelog entries)

** Patch added: "lintian_ubuntu.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+attachment/5553373/+files/lintian_ubuntu.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957100

Title:
  Merge lintian 2.114.0 from Debian uinstable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957100] [NEW] Merge lintian 2.114.0 from Debian uinstable

2022-01-11 Thread Simon Chopin
Public bug reported:

Please merge the 2.114.0 version from Debian.

I'm guessing it is needed by the latest lintian-brush, which currently
FTBFS.

** Affects: lintian (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957100

Title:
  Merge lintian 2.114.0 from Debian uinstable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1957100/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1956753] Re: tests: Fails to generate a password-protected X509 certificate

2022-01-11 Thread Simon Chopin
Marking the libnet-ssleay-perl part as invalid to match upstream's
opinion that it's not fixable without breaking compatibility.

** Changed in: lemonldap-ng (Ubuntu)
   Status: New => Fix Committed

** Changed in: libnet-ssleay-perl (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1956753

Title:
  tests: Fails to generate a password-protected X509 certificate

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lemonldap-ng/+bug/1956753/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1956765] Re: autopkgtests fail with openssl 3.0.1

2022-01-07 Thread Simon Chopin
** Patch added: "py3.10.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/python3.10/+bug/1956765/+attachment/5552620/+files/py3.10.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1956765

Title:
  autopkgtests fail with openssl 3.0.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python3.10/+bug/1956765/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1956765] Re: autopkgtests fail with openssl 3.0.1

2022-01-07 Thread Simon Chopin
Attached are debdiffs for python3.9 and python3.10 that cherry-pick an
upstream fix for this. Fixed versions have been also been uploaded to
this PPA (just pop the ~ppa changelog entries):

https://launchpad.net/~schopin/+archive/ubuntu/test-ppa/+packages

** Patch added: "py3.9.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/python3.10/+bug/1956765/+attachment/5552619/+files/py3.9.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1956765

Title:
  autopkgtests fail with openssl 3.0.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python3.10/+bug/1956765/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1956765] [NEW] autopkgtests fail with openssl 3.0.1

2022-01-07 Thread Simon Chopin
Public bug reported:

The autopkgtest suites of python 3.9 and 3.10 fail against openssl 3.0.1
due to a faulty version check.

** Affects: python3.10 (Ubuntu)
 Importance: High
 Status: Confirmed

** Affects: python3.9 (Ubuntu)
 Importance: High
 Status: Confirmed


** Tags: transition-openssl3-jj update-excuse

** Also affects: python3.10 (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: python3.10 (Ubuntu)
   Status: New => Confirmed

** Changed in: python3.10 (Ubuntu)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1956765

Title:
  autopkgtests fail with openssl 3.0.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python3.10/+bug/1956765/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1956753] Re: tests: Fails to generate a password-protected X509 certificate

2022-01-07 Thread Simon Chopin
Bug reported upstream at https://gitlab.ow2.org/lemonldap-ng/lemonldap-
ng/-/issues/2682

** Bug watch added: gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues #2682
   https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2682

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1956753

Title:
  tests: Fails to generate a password-protected X509 certificate

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lemonldap-ng/+bug/1956753/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1956753] [NEW] tests: Fails to generate a password-protected X509 certificate

2022-01-07 Thread Simon Chopin
Public bug reported:

The test suite for lemonldap-ng fails when checking the newCertificate
REST endpoint with a given password. I'm fairly sure it is a bug in
libnet-ssleay-perl.

** Affects: lemonldap-ng (Ubuntu)
 Importance: High
 Status: New

** Affects: libnet-ssleay-perl (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: update-excuse

** Also affects: libnet-ssleay-perl (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1956753

Title:
  tests: Fails to generate a password-protected X509 certificate

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lemonldap-ng/+bug/1956753/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1951065] Re: [MIR] libio-prompt-tiny-perl

2022-01-06 Thread Simon Chopin
** Description changed:

- TBD
+ [Availability]
+ The package libio-prompt-tiny-perl is already in Ubuntu universe.
+ The package libio-prompt-tiny-perl builds for the architectures it is 
designed to work on.
+ It currently builds and works for architectures: all
+ Link to package 
[[https://launchpad.net/ubuntu/+source/libio-prompt-tiny-perl|libio-prompt-tiny-perl]]
+ 
+ [Rationale]
+ - The package libio-prompt-tiny-perl is required in Ubuntu main for lintian
+ - The package libio-prompt-tiny-perl will not generally be useful for a large 
part of
+   our user base, but is important/helpful still because lintian is an 
essential part
+   of the packaging toolkit
+ - The package libio-prompt-tiny-perl is a new runtime dependency of package 
 that
+   we already support
+ 
+ [Security]
+ - No CVEs/security issues in this software in the past
+ 
+ - no `suid` or `sgid` binaries
+ - no executables in `/sbin` and `/usr/sbin`
+ - Package does not install services, timers or recurring jobs
+ - Packages does not open privileged ports (ports < 1024)
+ - Packages does not contain extensions to security-sensitive software
+   (filters, scanners, plugins, UI skins, ...)
+ 
+ [Quality assurance - function/usage]
+ - The package works well right after install
+ 
+ [Quality assurance - maintenance]
+ - The package is well maintained in Debian/Ubuntu, as part of the Debian Perl 
team. It does not have *any* bug open, either in Debian nor in Ubuntu. Upstream 
is fairly inactive, with last release in 2015
+   - Ubuntu 
https://bugs.launchpad.net/ubuntu/+source/libio-prompt-tiny-perl/+bug
+   - Debian 
https://bugs.debian.org/cgi-bin/pkgreport.cgi?src=libio-prompt-tiny-perl
+ - The package does not deal with exotic hardware we cannot support
+ 
+ [Quality assurance - testing]
+ - The package runs a test suite on build time, if it fails
+   it makes the build fail, link to build log 
https://launchpadlibrarian.net/536120852/buildlog_ubuntu-impish-amd64.libio-interactive-perl_1.023-1_BUILDING.txt.gz
+   It should be noted that since by essence the code deals with interactive 
terminals, a fair share of the tests are skipped during the builds.
+ 
+ - The package runs the autodep8-perl autopkgtests, which includes running the
+   unit test suite, and is currently passing on all architectures:
+   https://autopkgtest.ubuntu.com/packages/libi/libio-prompt-tiny-perl
+ 
+ [Quality assurance - packaging]
+ - debian/watch is present and works
+ - This package does not yield massive lintian Warnings, Errors, except for 
outdated standards
+   and Vcs-* fields (fixed in Salsa but not uploaded)
+ - Link to the Debian lintian report: 
https://lintian.debian.org/sources/libio-prompt-tiny-perl
+ - Lintian overrides are not present
+ - This package does not rely on obsolete or about to be demoted packages.
+ - The package will not be installed by default
+ - Packaging and build is easy, link to d/rules 
https://sources.debian.org/src/libio-prompt-tiny-perl/0.003-1/debian/rules/
+ 
+ [Dependencies]
+ - No further depends or recommends dependencies that are not yet in main
+ 
+ [Standards compliance]
+ - This package correctly follows FHS and Debian Policy
+ 
+ [Maintenance/Owner]
+ - Owning Team will be Foundations
+ - Team is not yet, but will subscribe to the package before promotion
+ - This does not use static builds
+ - This does not use vendored code
+ 
+ [Background information]
+ The Package description explains the package well!
+ Upstream Name is David Golden 
+ Upstream project: https://github.com/dagolden/IO-Prompt-Tiny

** Changed in: libio-prompt-tiny-perl (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1951065

Title:
  [MIR] libio-prompt-tiny-perl

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libio-prompt-tiny-perl/+bug/1951065/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1945811] Re: libnet-ssleay-perl: Fail to build against OpenSSL 3.0

2022-01-05 Thread Simon Chopin
** Changed in: libnet-ssleay-perl (Ubuntu)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945811

Title:
  libnet-ssleay-perl: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libnet-ssleay-perl/+bug/1945811/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1945958] Re: neon27: Fail to build against OpenSSL 3.0

2022-01-05 Thread Simon Chopin
Fixed via Debian sync of version 0.32.1

** Changed in: neon27 (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945958

Title:
  neon27: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/neon27/+bug/1945958/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1945998] Re: pam-p11: Fail to build against OpenSSL 3.0

2022-01-05 Thread Simon Chopin
This has been fixed independently by Steve in 0.3.1-1ubuntu1

** Changed in: pam-p11 (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945998

Title:
  pam-p11: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pam-p11/+bug/1945998/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1946014] Re: ovn: Fail to build against OpenSSL 3.0

2022-01-05 Thread Simon Chopin
Marking as Confirmed as the FTBFS has actually hit the version currently
in the archive.

** Changed in: ovn (Ubuntu)
   Status: Expired => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1946014

Title:
  ovn: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ovn/+bug/1946014/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1931369] Re: various lintian-brush Autopkgtest fails in Impish

2021-12-17 Thread Simon Chopin
The dh_assistant issue should be fixed in the upcoming 0.115.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931369

Title:
  various lintian-brush Autopkgtest fails in Impish

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/debmutate/+bug/1931369/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1955026] Re: Upgrade openssl to 3.0.1 on Jammy

2021-12-16 Thread Simon Chopin
Attached is a debdiff for this upgrade. Alternatively, a packaged
version has been uploaded to the following PPA, just pop the last
changelog entry to get the proper uploadable version:

https://launchpad.net/~schopin/+archive/ubuntu/test-
ppa/+sourcepub/13051752/+listing-archive-extra

** Patch added: "openssl.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1955026/+attachment/5547978/+files/openssl.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1955026

Title:
  Upgrade openssl to 3.0.1 on Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1955026/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1955026] [NEW] Upgrade openssl to 3.0.1 on Jammy

2021-12-16 Thread Simon Chopin
*** This bug is a security vulnerability ***

Public security bug reported:

Upstream has released a new version 3.0.1, including a security fix.

https://mta.openssl.org/pipermail/openssl-announce/2021-December/000212.html
https://mta.openssl.org/pipermail/openssl-announce/2021-December/000213.html

** Affects: openssl (Ubuntu)
 Importance: High
 Status: New


** Tags: transition-openssl3-jj

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1955026

Title:
  Upgrade openssl to 3.0.1 on Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1955026/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953301] Re: Segfault on AArch64 caused by OpenSSL affecting numerous packages

2021-12-16 Thread Simon Chopin
Sounds suspiciously similar to
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1951279 but I'd
like confirmation that the situation described in the meson issue
comment (TLS 1.2 with ECDHE-RSA-CHACHA20-POLY1305) also applies there
before marking as duplicate.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953301

Title:
  Segfault on AArch64 caused by OpenSSL affecting numerous packages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1953301/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953301] Re: Segfault on AArch64 caused by OpenSSL affecting numerous packages

2021-12-16 Thread Simon Chopin
** Tags added: rls-ff-incoming

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953301

Title:
  Segfault on AArch64 caused by OpenSSL affecting numerous packages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1953301/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953487] Re: FTBFS against OpenSSL3.0

2021-12-07 Thread Simon Chopin
** Changed in: pgbouncer (Ubuntu)
   Status: New => Fix Committed

** Changed in: pgbouncer (Ubuntu)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953487

Title:
  FTBFS against OpenSSL3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pgbouncer/+bug/1953487/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953487] [NEW] FTBFS against OpenSSL3.0

2021-12-07 Thread Simon Chopin
Public bug reported:

This package fails to build against OpenSSL 3.0, due to an underlying
segfault.

This has been reported upstream at
https://github.com/libusual/libusual/issues/35 (embedded within the
pgbouncer source), this issue is for tracing purposes.

** Affects: pgbouncer (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: transition-openssl3-jj

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953487

Title:
  FTBFS against OpenSSL3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pgbouncer/+bug/1953487/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953128] Re: GCC ICE: in create_fix_barrier, at config/arm/arm.c:17891

2021-12-07 Thread Simon Chopin
Oh yes sorry, I should have notified the bug manually. Thanks for
forwarding it to Debian!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953128

Title:
  GCC ICE: in create_fix_barrier, at config/arm/arm.c:17891

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gcc-11/+bug/1953128/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1946007] Re: pkcs11-helper: Fail to build against OpenSSL 3.0

2021-12-03 Thread Simon Chopin
** Changed in: pkcs11-helper (Ubuntu)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1946007

Title:
  pkcs11-helper: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pkcs11-helper/+bug/1946007/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953128] Re: GCC ICE: in create_fix_barrier, at config/arm/arm.c:17891

2021-12-03 Thread Simon Chopin
Workaround for the failure in postgresql-14

** Patch added: "postgresql-14.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/gcc-11/+bug/1953128/+attachment/5545119/+files/postgresql-14.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953128

Title:
  GCC ICE: in create_fix_barrier, at config/arm/arm.c:17891

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gcc-11/+bug/1953128/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953128] [NEW] GCC ICE: in create_fix_barrier, at config/arm/arm.c:17891

2021-12-03 Thread Simon Chopin
Public bug reported:

This ICE was hit when building Postgresql-14 on GCC 11.2 on armhf

A similar issue has been found in Fedora when building qemu:
https://lists.fedoraproject.org/archives/list/de...@lists.fedoraproject.org/thread/GD3ABSWD6HHTNEKV2EJY4PXABQ245UCZ/

The issue is tracked upstream at
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103395

** Affects: gcc-11 (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: postgresql-14 (Ubuntu)
 Importance: Undecided
 Status: New

** Also affects: gcc-11 (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953128

Title:
  GCC ICE: in create_fix_barrier, at config/arm/arm.c:17891

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gcc-11/+bug/1953128/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953023] Re: Fail to detect key length with OpenSSL 3

2021-12-02 Thread Simon Chopin
This patch solves the issue. Its autopkgtests have been run both against
OpenSSL 1.1 and 3.0, and it has been forwarded to Debian at
https://salsa.debian.org/apache-team/ssl-cert/-/merge_requests/3

** Patch added: "ssl-cert.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/ssl-cert/+bug/1953023/+attachment/5544912/+files/ssl-cert.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953023

Title:
  Fail to detect key length with OpenSSL 3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ssl-cert/+bug/1953023/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953023] [NEW] Fail to detect key length with OpenSSL 3

2021-12-02 Thread Simon Chopin
Public bug reported:

As seen in the autopkgtest, make-ssl-cert output a warning "WARNING:
Cannot determine RSA key length" which breaks the tests.

** Affects: ssl-cert (Ubuntu)
 Importance: High
 Status: Confirmed


** Tags: transition-openssl3-jj update-excuse

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953023

Title:
  Fail to detect key length with OpenSSL 3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ssl-cert/+bug/1953023/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1952935] [NEW] RM for FTBFS blocking the OpenSSL3 transition

2021-12-01 Thread Simon Chopin
Public bug reported:

Hi,

The libneo4j-client package FTBFS in Impish and Jammy:
https://people.canonical.com/~ginggs/ftbfs-report/test-rebuild-20210927-impish-impish.html
https://launchpad.net/ubuntu/+source/libneo4j-client/2.2.0-1.1build1

The issue is non-trivial to fix (casting between complex C
structs/unions with similar memory layouts), and the package is involved
in the OpenSSL transition.

I couldn't find any reverse-dependency:
❯ reverse-depends src:libneo4j-client
No reverse dependencies found
❯ reverse-depends -b src:libneo4j-client
No reverse dependencies found

Thanks in advance!
Simon

** Affects: libneo4j-client (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: transition-openssl3-jj

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1952935

Title:
  RM for FTBFS blocking the OpenSSL3 transition

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libneo4j-client/+bug/1952935/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1945795] Re: krb5: Fail to build against OpenSSL 3.0

2021-11-30 Thread Simon Chopin
When I upload to my test PPA I always add a new entry "PPA upload" to
make sure that the whole entry is scrapped, including the ~ppa version
suffix. The actual entry is the one before that.

My usual sponsored uploads are based on debdiffs rather than direct PPA
versions so this has never be an issue. For future reference, what would
be a better way than this? The debdiff seemed too messy to be useful...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945795

Title:
  krb5: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1945795/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1952775] [NEW] RM from Jammy for lack of OpenSSL 3 support

2021-11-30 Thread Simon Chopin
Public bug reported:

Hi,

Please remove libdigidoc from Jammy, as it fails to build against
OpenSSL 3.0, which hinders the transition.

https://launchpad.net/ubuntu/+source/libdigidoc/3.10.5-2build1

Fixing the failure is non-trivial, and without upstream involvement (see below)
I'd much rather have this package out of the archive rather than shipped with 
buggy
patches, especially given its purpose of government ID management.

This library has no reverse-dependencies in the archive:
❯ reverse-depends src:libdigidoc
No reverse dependencies found
❯ reverse-depends -b src:libdigidoc
No reverse dependencies found

Furthermore, it appears to be dead upstream, as the authors list it as EOL 
since 2015
https://www.id.ee/en/rubriik/digidoc-libraries/ (cdigidoc)
and have archive the Github repo:
https://github.com/open-eid/libdigidoc

Thanks in advance

** Affects: libdigidoc (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: transition-openssl3-jj

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1952775

Title:
  RM from Jammy for lack of OpenSSL 3 support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libdigidoc/+bug/1952775/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1952741] Re: Please RM for lack of OpenSSL 3 support

2021-11-30 Thread Simon Chopin
** Tags added: transition-openssl3-jj

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1952741

Title:
  Please RM for lack of OpenSSL 3 support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cfengine3/+bug/1952741/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1952744] [NEW] Please remove from Jammy

2021-11-30 Thread Simon Chopin
Public bug reported:

Hi,

Please remove gatling from the Jammy archive, as the package FTBFS since
Impish, which blocks the OpenSSL 3 transition:

https://people.canonical.com/~ginggs/ftbfs-report/test-rebuild-20210927-impish-impish.html
https://launchpad.net/ubuntu/+source/gatling/0.13-6.1build1

This is a leaf package without reverse-dependencies that I could find:

❯ reverse-depends src:gatling
No reverse dependencies found
❯ reverse-depends -b src:gatling
No reverse dependencies found

I was unable to find any public bug tracker or development mailing-list
for gatling. The Debian package lags behind upstream significantly (0.13
was released in 2012, current upstream is 0.16 release in 2020).

Thanks in advance!

** Affects: gatling (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: transition-openssl3-jj

** Tags added: transition-openssl3-jj

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1952744

Title:
  Please remove from Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gatling/+bug/1952744/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1952741] [NEW] Please RM for lack of OpenSSL 3 support

2021-11-30 Thread Simon Chopin
Public bug reported:

Hi,

Please remove cfengine3 from Jammy, as it fails to build against OpenSSL 3.0 
with no trivial fix available, see
https://launchpad.net/ubuntu/+source/cfengine3/3.15.2-3build1

Upstream is aware of the issue but hasn't succeeded in coming up with a fix of 
their own so far:
https://tracker.mender.io/browse/CFE-3798
https://github.com/cfengine/libntech/pull/155

The issue has been reported in Debian:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990369

The package has no reverse-dependencies that I could find:
❯ reverse-depends src:cfengine3
No reverse dependencies found

❯ reverse-depends -b src:cfengine3
No reverse dependencies found

Thanks in advance!

** Affects: cfengine3 (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1952741

Title:
  Please RM for lack of OpenSSL 3 support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cfengine3/+bug/1952741/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1945812] Re: librabbitmq: Fail to build against OpenSSL 3.0

2021-11-30 Thread Simon Chopin
Just retried the patch in a new build against -proposed, it worked fine.
I'm guessing the previous failure was due to a dependency that wasn't
compatible with OpenSSL 3 at the time, or just that -proposed was broken
at the time?

In any case, I've refreshed the version in
https://launchpad.net/~schopin/+archive/ubuntu/test-ppa/+packages which
has now picked up the OpenSSL 3 present in -proposed, and am officially
looking for a sponsor :)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945812

Title:
  librabbitmq: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/librabbitmq/+bug/1945812/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1946193] Re: sbsigntool: Fail to build against OpenSSL 3.0

2021-11-29 Thread Simon Chopin
With the proper diff.

** Patch added: "sbsigntool.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/sbsigntool/+bug/1946193/+attachment/5544119/+files/sbsigntool.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1946193

Title:
  sbsigntool: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sbsigntool/+bug/1946193/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1945795] Re: krb5: Fail to build against OpenSSL 3.0

2021-11-26 Thread Simon Chopin
I've uploaded a package to

https://launchpad.net/~schopin/+archive/ubuntu/test-ppa/+packages

based on the above MR. autopkgtests against -proposed ran fine on amd64.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945795

Title:
  krb5: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/krb5/+bug/1945795/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1952237] Re: FTBFS in jammy

2021-11-25 Thread Simon Chopin
** Patch added: "cryptsetup.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1952237/+attachment/5543339/+files/cryptsetup.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1952237

Title:
  FTBFS in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1952237/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1952237] [NEW] FTBFS in jammy

2021-11-25 Thread Simon Chopin
Public bug reported:

THe build depends on libsepol1-dev, which has been replaced by libsepol-
dev in jammy.

** Affects: cryptsetup (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1952237

Title:
  FTBFS in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1952237/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1945764] Re: crda: Fail to build against OpenSSL 3.0

2021-11-25 Thread Simon Chopin
Refresh of the debdiff against the latest version

** Patch added: "crda.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/crda/+bug/1945764/+attachment/5543314/+files/crda.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945764

Title:
  crda: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/crda/+bug/1945764/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1945768] Re: erlang: Fail to build against OpenSSL 3.0

2021-11-25 Thread Simon Chopin
Refreshed the patch against the newer version.

** Patch added: "erlang.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/erlang/+bug/1945768/+attachment/5543290/+files/erlang.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945768

Title:
  erlang: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/erlang/+bug/1945768/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1951993] Re: libnet-ssleay-perl FTBFS

2021-11-25 Thread Simon Chopin
See bug #1952208 for a simple resolution of the issue.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1951993

Title:
  libnet-ssleay-perl FTBFS

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/aptdaemon/+bug/1951993/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1952208] [NEW] Sync libnet-ssleay-perl 1.91.01-1 (main) from Debian experimental (main)

2021-11-25 Thread Simon Chopin
Public bug reported:

Please sync libnet-ssleay-perl 1.91.01-1 (main) from Debian experimental
(main)

Hi! I'd like to sync the Debian experimental version of libnet-ssleay-perl. 
This is a "development release" that's explicitly a precursor to a stable 
release "soon", as indicated there:

https://github.com/radiator-software/p5-net-ssleay/issues/326

The repository hasn't seen much activity relevant to our use-case since the
release, either in commits or issues opened.

Explanation of the Ubuntu delta and why it can be dropped:
  * No-change rebuild to build packages with zstd compression.
  -> Self explanatory
  * Merge from Debian, remaining changes:
- Patch t/local/44_sess.t to set security level 1 when testing TLSv1 &
TLSv1.1. The default security level 2 prohibits TLS versions below
TLSv1.2.
- Fakesync, due to tarball missmatch.
  -> The tests have been changed in the upstream version to only run on
  protocol versions supported by the underlying libssl, and 44_sess
  now explicitly sets the security level for the older protocols when running 
with OpenSSL 3.0

Changelog entries since current jammy version 1.88-3ubuntu2:

libnet-ssleay-perl (1.91.01-1) experimental; urgency=medium

  * Import upstream development release 1.91_01.
Adds OpenSSL3 support (LP: #1945811)
  * Update build dependencies.
  * Refresh 20no-stray-libz-link.patch (offset).
  * Upload to experimental.

 -- gregor herrmann   Sat, 13 Nov 2021 18:08:00 +0100

libnet-ssleay-perl (1.90-1) unstable; urgency=medium

  [ gregor herrmann ]
  * Replace '--with perl_openssl' in debian/rules with a build dependency
on 'dh-sequence-perl-openssl'.
  * Update 'DEB_BUILD_MAINT_OPTIONS = hardening=+bindnow' to '=+all'.

  [ Debian Janitor ]
  * Apply multi-arch hints.
+ libnet-ssleay-perl: Add Multi-Arch: same.
  * Bump debhelper from old 12 to 13.
  * Update standards version to 4.5.1, no changes needed.

  [ gregor herrmann ]
  * Import upstream version 1.90.
  * Update debian/upstream/metadata.
  * Update years of packaging copyright.
  * Update upstream copyright holders and contact.

  [ Simon Chopin ]
  * Refresh d/p/20no-stray-libz-link.patch
  * Drop openssl-1.1.1e.patch, merged upstream

  [ gregor herrmann ]
  * Install upstream CONTRIBUTING document.
  * Declare compliance with Debian Policy 4.6.0.
  * Add debian/tests/pkg-perl/smoke-files.
New helper modules for the tests are in inc/.

 -- gregor herrmann   Sat, 13 Nov 2021 17:38:08 +0100

** Affects: libnet-ssleay-perl (Ubuntu)
 Importance: Wishlist
 Status: New

** Changed in: libnet-ssleay-perl (Ubuntu)
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1952208

Title:
  Sync libnet-ssleay-perl 1.91.01-1 (main) from Debian experimental
  (main)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libnet-ssleay-perl/+bug/1952208/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1952144] Re: Update for openssl v3

2021-11-25 Thread Simon Chopin
** Tags added: transition-openssl3-jj

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1952144

Title:
  Update for openssl v3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/golang-github-mendersoftware-openssl/+bug/1952144/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1952081] [NEW] Bootstrap picolisp on s390x

2021-11-24 Thread Simon Chopin
Public bug reported:

The package currently cannot be built on s390x because it needs manual
bootstrapping, as it depends on itself for build.

Here are some briefs hints on how to achieve this:

 Anyone here has any experience bootstrapping a language in a "new" 
architecture? picolisp FTBFS on s390x because it needs itself, and I'm idly 
wondering how to solve the problem
 schopin:  use debian's build to build ubuntu package; vendor it in a 
source package; upload to bileto ppa; rebuild again afresh; publish to ubuntu 
archive; rebuild in ubuntu archive proper again.
 schopin:  alternative is to cross-build the first one.
 schopin:  sometimes, debian/* has instructions for bootstrapping. as the 
first upload of the thing had to be bootstrapped by the person

** Affects: picolisp (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1952081

Title:
  Bootstrap picolisp on s390x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/picolisp/+bug/1952081/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Re: [Bug 1945956] Re: mysql-8.0: Fail to build against OpenSSL 3.0

2021-11-22 Thread Simon Chopin
Oh I'd rather not take over, thank you :-D

I just wanted to do a quick sanity check of this patch since mysql-8 was
the last package on my list that didn't have any obvious sign of
activity. I'm glad you're on it :)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945956

Title:
  mysql-8.0: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-8.0/+bug/1945956/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1945956] Re: mysql-8.0: Fail to build against OpenSSL 3.0

2021-11-22 Thread Simon Chopin
OK, so I tested out the patches linked above. Turns out they still FTBFS
against libssl3, because there is some SSL code buried in some plugins
which hasn't been update. ALso, the patched package also FTBFS against
libssl1.1 as the test suite fails on main.ssl_deprecated_tls_versions.
I'm currently rebuilding the package from scratch to check that it is
indeed a regression from the patch, and not something that's been
introduced by the 1.1.1l version of OpenSSL.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945956

Title:
  mysql-8.0: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-8.0/+bug/1945956/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1943109] Re: Merge 1.1.1l-1 version from Debian

2021-11-22 Thread Simon Chopin
** Changed in: openssl (Ubuntu)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1943109

Title:
  Merge 1.1.1l-1 version from Debian

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1943109/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1946217] Re: unbound: Fail to build against OpenSSL 3.0

2021-11-22 Thread Simon Chopin
To be clear: the tests also fail when built against libssl1.1

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1946217

Title:
  unbound: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unbound/+bug/1946217/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1946217] Re: unbound: Fail to build against OpenSSL 3.0

2021-11-22 Thread Simon Chopin
I can confirm that the version 1.13.2 fixes the issue, as I've uploaded
an updated package to schopin/foundation-openssl3 which builds with
success. However, the autopkgtests fail because of the python 3.10
transition (couldn't find the _unbound module for 3.10)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1946217

Title:
  unbound: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unbound/+bug/1946217/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1951624] [NEW] OpenSSL 3.0 transition might lead to unsupported protocols

2021-11-19 Thread Simon Chopin
Public bug reported:

OpenSSL 3.0, which is planned to land in the archive Very Soon™, has
moved quite a few algorithms to its "legacy" provider, which isn't
loaded by default. Some of those algorithms are used in various
protocols implemented by wpa_supplicant, so it's likely that the package
will be broken in this regard.

Sadly, this isn't caught by either the build-time tests nor the
autopkgtests.

A first good step would be to patch wpa_supplicant to load the "legacy"
provider (and the default one too, cf
https://www.openssl.org/docs/manmaster/man7/crypto.html , look for
"legacy").

** Affects: wpa (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: fr-1881 transition-openssl3-jj

** Tags added: fr-1881

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1951624

Title:
  OpenSSL 3.0 transition might lead to unsupported protocols

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/1951624/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1946205] Re: squid: Fail to build against OpenSSL 3.0

2021-11-19 Thread Simon Chopin
Patch based on the PR linked above, uploaded to both
https://launchpad.net/~schopin/+archive/ubuntu/test-ppa/ (libssl1.1)
and
https://launchpad.net/~schopin/+archive/ubuntu/foundation-openssl3/ (libssl3)

The autopkgtests fail currently because of
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1951476

** Patch added: "squid.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/squid/+bug/1946205/+attachment/5542138/+files/squid.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1946205

Title:
  squid: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid/+bug/1946205/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1945980] Re: openvpn: Fail to build against OpenSSL 3.0

2021-11-19 Thread Simon Chopin
easy-rsa fix uploaded ( https://bugs.launchpad.net/ubuntu/+source/easy-
rsa/+bug/1951581 )

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945980

Title:
  openvpn: Fail to build against OpenSSL 3.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openvpn/+bug/1945980/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

<    1   2   3   4   5   6   7   >