Bug#1026508: ca-certificates: FTBFS: TypeError: argument 'data': 'bytearray' object cannot be converted to 'PyBytes'

2023-03-03 Thread Kurt Roeckx
Hi,

Are you waiting for something before uploading this fix?


Kurt



Bug#1026508: ca-certificates: FTBFS: TypeError: argument 'data': 'bytearray' object cannot be converted to 'PyBytes'

2023-02-21 Thread Samuel Henrique
Hello Julien,

> This is fixed in git, I need to get around to uploading an update.

Are you also planning to update the certificates for bookworm?

I'm asking as we are already in the freeze and there are a few
bugreports about old certificates that need to be dropped[0][1] (and I
assume there's also a bunch of new ones we need to get).

Are you looking into help maintaining the package as well?

[0] https://bugs.debian.org/1021749
[1] https://bugs.debian.org/1023945

Thank you,

-- 
Samuel Henrique 



Bug#1026508: ca-certificates: FTBFS: TypeError: argument 'data': 'bytearray' object cannot be converted to 'PyBytes'

2022-12-20 Thread Julien Cristau
Control: forcemerge 1008244 -1

This is fixed in git, I need to get around to uploading an update.

Cheers,
Julien

On Tue, Dec 20, 2022 at 05:36:27PM +0100, Lucas Nussbaum wrote:
> Source: ca-certificates
> Version: 20211016
> Severity: serious
> Justification: FTBFS
> Tags: bookworm sid ftbfs
> User: lu...@debian.org
> Usertags: ftbfs-20221220 ftbfs-bookworm
> 
> Hi,
> 
> During a rebuild of all packages in sid, your package failed to build
> on amd64.
> 
> 
> Relevant part (hopefully):
> > make[2]: Entering directory '/<>/mozilla'
> > python3 certdata2pem.py
> > Ignoring certificate "Verisign Class 1 Public Primary Certification 
> > Authority - G3".  SAUTH=CKT_NSS_MUST_VERIFY_TRUST, 
> > EPROT=CKT_NSS_TRUSTED_DELEGATOR
> > Ignoring certificate "Verisign Class 2 Public Primary Certification 
> > Authority - G3".  SAUTH=CKT_NSS_MUST_VERIFY_TRUST, 
> > EPROT=CKT_NSS_TRUSTED_DELEGATOR
> > Ignoring certificate "Certum Root CA".  SAUTH=CKT_NSS_MUST_VERIFY_TRUST, 
> > EPROT=CKT_NSS_TRUSTED_DELEGATOR
> > Ignoring certificate "Camerfirma Chambers of Commerce Root".  
> > SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> > Ignoring certificate "Camerfirma Global Chambersign Root".  
> > SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> > Certificate "DST Root CA X3" blacklisted, ignoring.
> > Ignoring certificate "SwissSign Platinum CA - G2".  
> > SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> > Ignoring certificate "OISTE WISeKey Global Root GA CA".  
> > SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> > Ignoring certificate "Chambers of Commerce Root - 2008".  
> > SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> > Ignoring certificate "Global Chambersign Root - 2008".  
> > SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> > Certificate "Explicitly Distrust DigiNotar Root CA" blacklisted, ignoring.
> > Certificate "Explicitly Distrusted DigiNotar PKIoverheid G2" blacklisted, 
> > ignoring.
> > Certificate "MITM subCA 1 issued by Trustwave" blacklisted, ignoring.
> > Certificate "MITM subCA 2 issued by Trustwave" blacklisted, ignoring.
> > Certificate "TURKTRUST Mis-issued Intermediate CA 1" blacklisted, ignoring.
> > Certificate "TURKTRUST Mis-issued Intermediate CA 2" blacklisted, ignoring.
> > Ignoring certificate "Staat der Nederlanden Root CA - G3".  
> > SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> > Ignoring certificate "Symantec Class 1 Public Primary Certification 
> > Authority - G6".  SAUTH=CKT_NSS_MUST_VERIFY_TRUST, 
> > EPROT=CKT_NSS_TRUSTED_DELEGATOR
> > Ignoring certificate "Symantec Class 2 Public Primary Certification 
> > Authority - G6".  SAUTH=CKT_NSS_MUST_VERIFY_TRUST, 
> > EPROT=CKT_NSS_TRUSTED_DELEGATOR
> > Ignoring certificate "D-TRUST Root CA 3 2013".  
> > SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> > Ignoring certificate "GlobalSign Secure Mail Root R45".  
> > SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> > Ignoring certificate "GlobalSign Secure Mail Root E45".  
> > SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> > Traceback (most recent call last):
> >   File "/<>/mozilla/certdata2pem.py", line 125, in 
> > cert = x509.load_der_x509_certificate(obj['CKA_VALUE'])
> >   File "/usr/lib/python3/dist-packages/cryptography/x509/base.py", line 
> > 528, in load_der_x509_certificate
> > return rust_x509.load_der_x509_certificate(data)
> > TypeError: argument 'data': 'bytearray' object cannot be converted to 
> > 'PyBytes'
> > make[2]: *** [Makefile:6: all] Error 1
> 
> 
> The full build log is available from:
> http://qa-logs.debian.net/2022/12/20/ca-certificates_20211016_unstable.log
> 
> All bugs filed during this archive rebuild are listed at:
> https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20221220;users=lu...@debian.org
> or:
> https://udd.debian.org/bugs/?release=na=ign=7=7=only=ftbfs-20221220=lu...@debian.org=1=1=1=1#results
> 
> A list of current common problems and possible solutions is available at
> http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!
> 
> If you reassign this bug to another package, please mark it as 'affects'-ing
> this package. See https://www.debian.org/Bugs/server-control#affects
> 
> If you fail to reproduce this, please provide a build log and diff it with 
> mine
> so that we can identify if something relevant changed in the meantime.
> 



Bug#1026508: ca-certificates: FTBFS: TypeError: argument 'data': 'bytearray' object cannot be converted to 'PyBytes'

2022-12-20 Thread Lucas Nussbaum
Source: ca-certificates
Version: 20211016
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-20221220 ftbfs-bookworm

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.


Relevant part (hopefully):
> make[2]: Entering directory '/<>/mozilla'
> python3 certdata2pem.py
> Ignoring certificate "Verisign Class 1 Public Primary Certification Authority 
> - G3".  SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> Ignoring certificate "Verisign Class 2 Public Primary Certification Authority 
> - G3".  SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> Ignoring certificate "Certum Root CA".  SAUTH=CKT_NSS_MUST_VERIFY_TRUST, 
> EPROT=CKT_NSS_TRUSTED_DELEGATOR
> Ignoring certificate "Camerfirma Chambers of Commerce Root".  
> SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> Ignoring certificate "Camerfirma Global Chambersign Root".  
> SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> Certificate "DST Root CA X3" blacklisted, ignoring.
> Ignoring certificate "SwissSign Platinum CA - G2".  
> SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> Ignoring certificate "OISTE WISeKey Global Root GA CA".  
> SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> Ignoring certificate "Chambers of Commerce Root - 2008".  
> SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> Ignoring certificate "Global Chambersign Root - 2008".  
> SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> Certificate "Explicitly Distrust DigiNotar Root CA" blacklisted, ignoring.
> Certificate "Explicitly Distrusted DigiNotar PKIoverheid G2" blacklisted, 
> ignoring.
> Certificate "MITM subCA 1 issued by Trustwave" blacklisted, ignoring.
> Certificate "MITM subCA 2 issued by Trustwave" blacklisted, ignoring.
> Certificate "TURKTRUST Mis-issued Intermediate CA 1" blacklisted, ignoring.
> Certificate "TURKTRUST Mis-issued Intermediate CA 2" blacklisted, ignoring.
> Ignoring certificate "Staat der Nederlanden Root CA - G3".  
> SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> Ignoring certificate "Symantec Class 1 Public Primary Certification Authority 
> - G6".  SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> Ignoring certificate "Symantec Class 2 Public Primary Certification Authority 
> - G6".  SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> Ignoring certificate "D-TRUST Root CA 3 2013".  
> SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> Ignoring certificate "GlobalSign Secure Mail Root R45".  
> SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> Ignoring certificate "GlobalSign Secure Mail Root E45".  
> SAUTH=CKT_NSS_MUST_VERIFY_TRUST, EPROT=CKT_NSS_TRUSTED_DELEGATOR
> Traceback (most recent call last):
>   File "/<>/mozilla/certdata2pem.py", line 125, in 
> cert = x509.load_der_x509_certificate(obj['CKA_VALUE'])
>   File "/usr/lib/python3/dist-packages/cryptography/x509/base.py", line 528, 
> in load_der_x509_certificate
> return rust_x509.load_der_x509_certificate(data)
> TypeError: argument 'data': 'bytearray' object cannot be converted to 
> 'PyBytes'
> make[2]: *** [Makefile:6: all] Error 1


The full build log is available from:
http://qa-logs.debian.net/2022/12/20/ca-certificates_20211016_unstable.log

All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20221220;users=lu...@debian.org
or:
https://udd.debian.org/bugs/?release=na=ign=7=7=only=ftbfs-20221220=lu...@debian.org=1=1=1=1#results

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

If you reassign this bug to another package, please mark it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.