Source: openconnect
Version: 7.08-3
Severity: serious
Justification: FTBFS on amd64
Tags: buster sid
Usertags: ftbfs-20181229 ftbfs-buster

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.

Relevant part (hopefully):
> make[4]: Entering directory '/<<PKGBUILDDIR>>/tests'
> FAIL: auth-username-pass
> FAIL: auth-certificate
> FAIL: id-test
> FAIL: auth-pkcs11
> PASS: seqtest
> PASS: lzstest
> ============================================
>    openconnect 7.08: tests/test-suite.log
> ============================================
> 
> # TOTAL: 6
> # PASS:  2
> # SKIP:  0
> # XFAIL: 0
> # FAIL:  4
> # XPASS: 0
> # ERROR: 0
> 
> .. contents:: :depth: 2
> 
> FAIL: auth-username-pass
> ========================
> 
> Testing certificate auth... 
> warning: skipping unknown option 'cookie-validity'
> Parsing plain auth method subconfig using legacy format
> note: setting 'plain' as primary authentication method
> note: setting 'file' as supplemental config option
> listening (TCP) on 0.0.0.0:443...
> listening (TCP) on [::]:443...
> listening (UDP) on 0.0.0.0:443...
> listening (UDP) on [::]:443...
> ocserv[13182]: main: not using control unix socket
> ocserv[13182]: main: initialized ocserv 0.12.1
> ocserv[13186]: sec-mod: reading supplemental config from files
> ocserv[13186]: sec-mod: sec-mod initialized (socket: ./ocserv-socket.51a94d1b)
> Connecting to obtain cookie... ocserv[13221]: GnuTLS error (at 
> worker-vpn.c:795): No supported cipher suites have been found.
> Failure: Could not receive cookie from server
> ocserv[13182]: main: termination request received; waiting for children to die
> ocserv[13182]: main:127.0.0.2:23190 user disconnected (reason: unspecified, 
> rx: 0, tx: 0)
> FAIL auth-username-pass (exit status: 1)
> 
> FAIL: auth-certificate
> ======================
> 
> Testing certificate auth... 
> warning: skipping unknown option 'cookie-validity'
> Parsing plain auth method subconfig using legacy format
> note: setting 'certificate+plain' as primary authentication method
> note: setting 'file' as supplemental config option
> listening (TCP) on 0.0.0.0:443...
> listening (TCP) on [::]:443...
> listening (UDP) on 0.0.0.0:443...
> listening (UDP) on [::]:443...
> ocserv[13184]: main: not using control unix socket
> ocserv[13184]: main: initialized ocserv 0.12.1
> ocserv[13187]: sec-mod: reading supplemental config from files
> ocserv[13187]: sec-mod: sec-mod initialized (socket: ./ocserv-socket.6c6705ae)
> Connecting to obtain cookie (with key user-key-pkcs1.pem)... ocserv[13220]: 
> GnuTLS error (at worker-vpn.c:795): No supported cipher suites have been 
> found.
> ocserv[13184]: main:127.0.0.2:23193 user disconnected (reason: unspecified, 
> rx: 0, tx: 0)
> SSL connection failure: The TLS connection was non-properly terminated.
> Failed to open HTTPS connection to 127.0.0.2
> Failed to obtain WebVPN cookie
> Failure: Could not connect with key user-key-pkcs1.pem!
> ocserv[13184]: main: termination request received; waiting for children to die
> FAIL auth-certificate (exit status: 1)
> 
> FAIL: id-test
> =============
> 
> Testing certificate auth... 
> Connecting with legacy hash... Failure: Could not receive cookie from server
> FAIL id-test (exit status: 1)
> 
> FAIL: auth-pkcs11
> =================
> 
> Testing PKCS#11 auth... 
> warning: skipping unknown option 'cookie-validity'
> Parsing plain auth method subconfig using legacy format
> note: setting 'certificate+plain' as primary authentication method
> note: setting 'file' as supplemental config option
> listening (TCP) on 0.0.0.0:443...
> listening (TCP) on [::]:443...
> listening (UDP) on 0.0.0.0:443...
> listening (UDP) on [::]:443...
> ocserv[13242]: main: not using control unix socket
> ocserv[13242]: main: initialized ocserv 0.12.1
> ocserv[13245]: sec-mod: reading supplemental config from files
> ocserv[13245]: sec-mod: sec-mod initialized (socket: ./ocserv-socket.ea41c786)
> Connecting to obtain cookie (token openconnect-test key object=RSA)... 
> ocserv[13281]: GnuTLS error (at worker-vpn.c:795): No supported cipher suites 
> have been found.
> SSL connection failure: The TLS connection was non-properly terminated.
> ocserv[13242]: main:127.0.0.2:23259 user disconnected (reason: unspecified, 
> rx: 0, tx: 0)
> Failed to open HTTPS connection to 127.0.0.2
> Failed to obtain WebVPN cookie
> Failure: Could not connect with token openconnect-test key object=RSA!
> ocserv[13242]: main: termination request received; waiting for children to die
> FAIL auth-pkcs11 (exit status: 1)
> 
> ============================================================================
> Testsuite summary for openconnect 7.08
> ============================================================================
> # TOTAL: 6
> # PASS:  2
> # SKIP:  0
> # XFAIL: 0
> # FAIL:  4
> # XPASS: 0
> # ERROR: 0
> ============================================================================
> See tests/test-suite.log
> ============================================================================
> make[4]: *** [Makefile:865: test-suite.log] Error 1
> make[4]: Leaving directory '/<<PKGBUILDDIR>>/tests'
> make[3]: *** [Makefile:973: check-TESTS] Error 2
> make[3]: Leaving directory '/<<PKGBUILDDIR>>/tests'
> make[2]: *** [Makefile:1089: check-am] Error 2
> make[2]: Leaving directory '/<<PKGBUILDDIR>>/tests'
> make[1]: *** [Makefile:1341: check-recursive] Error 1
> make[1]: Leaving directory '/<<PKGBUILDDIR>>'
> dh_auto_test: make -j2 check VERBOSE=1 returned exit code 2

The full build log is available from:
   http://aws-logs.debian.net/2018/12/29/openconnect_7.08-3_unstable.log

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.

Reply via email to