Source: openconnect Version: 7.08-3 Severity: serious Justification: FTBFS on amd64 Tags: buster sid Usertags: ftbfs-20181229 ftbfs-buster
Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part (hopefully): > make[4]: Entering directory '/<<PKGBUILDDIR>>/tests' > FAIL: auth-username-pass > FAIL: auth-certificate > FAIL: id-test > FAIL: auth-pkcs11 > PASS: seqtest > PASS: lzstest > ============================================ > openconnect 7.08: tests/test-suite.log > ============================================ > > # TOTAL: 6 > # PASS: 2 > # SKIP: 0 > # XFAIL: 0 > # FAIL: 4 > # XPASS: 0 > # ERROR: 0 > > .. contents:: :depth: 2 > > FAIL: auth-username-pass > ======================== > > Testing certificate auth... > warning: skipping unknown option 'cookie-validity' > Parsing plain auth method subconfig using legacy format > note: setting 'plain' as primary authentication method > note: setting 'file' as supplemental config option > listening (TCP) on 0.0.0.0:443... > listening (TCP) on [::]:443... > listening (UDP) on 0.0.0.0:443... > listening (UDP) on [::]:443... > ocserv[13182]: main: not using control unix socket > ocserv[13182]: main: initialized ocserv 0.12.1 > ocserv[13186]: sec-mod: reading supplemental config from files > ocserv[13186]: sec-mod: sec-mod initialized (socket: ./ocserv-socket.51a94d1b) > Connecting to obtain cookie... ocserv[13221]: GnuTLS error (at > worker-vpn.c:795): No supported cipher suites have been found. > Failure: Could not receive cookie from server > ocserv[13182]: main: termination request received; waiting for children to die > ocserv[13182]: main:127.0.0.2:23190 user disconnected (reason: unspecified, > rx: 0, tx: 0) > FAIL auth-username-pass (exit status: 1) > > FAIL: auth-certificate > ====================== > > Testing certificate auth... > warning: skipping unknown option 'cookie-validity' > Parsing plain auth method subconfig using legacy format > note: setting 'certificate+plain' as primary authentication method > note: setting 'file' as supplemental config option > listening (TCP) on 0.0.0.0:443... > listening (TCP) on [::]:443... > listening (UDP) on 0.0.0.0:443... > listening (UDP) on [::]:443... > ocserv[13184]: main: not using control unix socket > ocserv[13184]: main: initialized ocserv 0.12.1 > ocserv[13187]: sec-mod: reading supplemental config from files > ocserv[13187]: sec-mod: sec-mod initialized (socket: ./ocserv-socket.6c6705ae) > Connecting to obtain cookie (with key user-key-pkcs1.pem)... ocserv[13220]: > GnuTLS error (at worker-vpn.c:795): No supported cipher suites have been > found. > ocserv[13184]: main:127.0.0.2:23193 user disconnected (reason: unspecified, > rx: 0, tx: 0) > SSL connection failure: The TLS connection was non-properly terminated. > Failed to open HTTPS connection to 127.0.0.2 > Failed to obtain WebVPN cookie > Failure: Could not connect with key user-key-pkcs1.pem! > ocserv[13184]: main: termination request received; waiting for children to die > FAIL auth-certificate (exit status: 1) > > FAIL: id-test > ============= > > Testing certificate auth... > Connecting with legacy hash... Failure: Could not receive cookie from server > FAIL id-test (exit status: 1) > > FAIL: auth-pkcs11 > ================= > > Testing PKCS#11 auth... > warning: skipping unknown option 'cookie-validity' > Parsing plain auth method subconfig using legacy format > note: setting 'certificate+plain' as primary authentication method > note: setting 'file' as supplemental config option > listening (TCP) on 0.0.0.0:443... > listening (TCP) on [::]:443... > listening (UDP) on 0.0.0.0:443... > listening (UDP) on [::]:443... > ocserv[13242]: main: not using control unix socket > ocserv[13242]: main: initialized ocserv 0.12.1 > ocserv[13245]: sec-mod: reading supplemental config from files > ocserv[13245]: sec-mod: sec-mod initialized (socket: ./ocserv-socket.ea41c786) > Connecting to obtain cookie (token openconnect-test key object=RSA)... > ocserv[13281]: GnuTLS error (at worker-vpn.c:795): No supported cipher suites > have been found. > SSL connection failure: The TLS connection was non-properly terminated. > ocserv[13242]: main:127.0.0.2:23259 user disconnected (reason: unspecified, > rx: 0, tx: 0) > Failed to open HTTPS connection to 127.0.0.2 > Failed to obtain WebVPN cookie > Failure: Could not connect with token openconnect-test key object=RSA! > ocserv[13242]: main: termination request received; waiting for children to die > FAIL auth-pkcs11 (exit status: 1) > > ============================================================================ > Testsuite summary for openconnect 7.08 > ============================================================================ > # TOTAL: 6 > # PASS: 2 > # SKIP: 0 > # XFAIL: 0 > # FAIL: 4 > # XPASS: 0 > # ERROR: 0 > ============================================================================ > See tests/test-suite.log > ============================================================================ > make[4]: *** [Makefile:865: test-suite.log] Error 1 > make[4]: Leaving directory '/<<PKGBUILDDIR>>/tests' > make[3]: *** [Makefile:973: check-TESTS] Error 2 > make[3]: Leaving directory '/<<PKGBUILDDIR>>/tests' > make[2]: *** [Makefile:1089: check-am] Error 2 > make[2]: Leaving directory '/<<PKGBUILDDIR>>/tests' > make[1]: *** [Makefile:1341: check-recursive] Error 1 > make[1]: Leaving directory '/<<PKGBUILDDIR>>' > dh_auto_test: make -j2 check VERBOSE=1 returned exit code 2 The full build log is available from: http://aws-logs.debian.net/2018/12/29/openconnect_7.08-3_unstable.log A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! About the archive rebuild: The rebuild was done on EC2 VM instances from Amazon Web Services, using a clean, minimal and up-to-date chroot. Every failed build was retried once to eliminate random failures.