Bug#849628: ufw: FTBFS: Command '--dry-run route allow ssh/udp' exited with '1', but expected '0'

Chris Lamb lamby at debian.org
Thu Dec 29 09:10:12 UTC 2016


Source: ufw
Version: 0.35-2
Severity: serious
Justification: fails to build from source
User: reproducible-builds at lists.alioth.debian.org
Usertags: ftbfs
X-Debbugs-Cc: reproducible-bugs at lists.alioth.debian.org

Dear Maintainer,

ufw fails to build from source in unstable/amd64:

  […]

  test_get_iptables_version (tests.unit.test_util.UtilTestCase)
  Test get_iptables_version() ... ok
  test_get_netfilter_capabilities (tests.unit.test_util.UtilTestCase)
  Test get_netfilter_capabilities() ... ok
  test_get_netstat_output (tests.unit.test_util.UtilTestCase)
  Test get_netstat_output() ... (TODO: fake-netstat) could not find tcp in:
  
  (TODO: fake-netstat) could not find udp in:
  
  (TODO: fake-netstat) could not find tcp in:
  
  (TODO: fake-netstat) could not find udp in:
  
  ok
  test_get_ppid (tests.unit.test_util.UtilTestCase)
  Test get_ppid() ... ok
  test_get_services_proto (tests.unit.test_util.UtilTestCase)
  Test get_services_proto() ... ok
  test_hex_decode (tests.unit.test_util.UtilTestCase)
  Test hex_decode() output ... ok
  test_hex_encode (tests.unit.test_util.UtilTestCase)
  Test hex_encode() output ... ok
  test_human_sort (tests.unit.test_util.UtilTestCase)
  Test human_sort() ... ok
  test_in_network (tests.unit.test_util.UtilTestCase)
  Test in_network() ... ok
  test_msg (tests.unit.test_util.UtilTestCase)
  Test msg() ... test msg()
  ('test msg()' output is intentional)
  test msg()
  ('test msg()' output is intentional)
  ok
  test_normalize_address_host_netmask (tests.unit.test_util.UtilTestCase)
  Test normalize_address() with host_netmask ... ok
  test_normalize_address_invalid_netmask (tests.unit.test_util.UtilTestCase)
  Test normalize_address() with invalid_netmask ... ok
  test_normalize_address_ipv6_cidr (tests.unit.test_util.UtilTestCase)
  Test normalize_address() with ipv6_cidr ... ok
  test_normalize_address_ipv6_short_notation (tests.unit.test_util.UtilTestCase)
  Test normalize_address() with ipv6_short_notation ... ok
  test_normalize_address_netmask_to_cidr (tests.unit.test_util.UtilTestCase)
  Test normalize_address() with netmask_to_cidr ... ok
  test_normalize_address_valid_netmask_to_non_cidr (tests.unit.test_util.UtilTestCase)
  Test normalize_address() with valid_netmask_to_non_cidr ... ok
  test_open_file_read (tests.unit.test_util.UtilTestCase)
  Test open_file_read() ... ok
  test_open_files (tests.unit.test_util.UtilTestCase)
  Test open_files() ... ok
  test_parse_netstat_output (tests.unit.test_util.UtilTestCase)
  Test parse_netstat_output() ... ok
  test_parse_port_proto (tests.unit.test_util.UtilTestCase)
  Test parse_port_proto() ... ok
  test_under_ssh (tests.unit.test_util.UtilTestCase)
  Test under_ssh() ... WARN: Couldn't find pid (is /proc mounted?)
  ok
  test_valid_address (tests.unit.test_util.UtilTestCase)
  Test valid_address() ... ok
  test_valid_address4 (tests.unit.test_util.UtilTestCase)
  Test valid_address4() ... ok
  test_valid_address6 (tests.unit.test_util.UtilTestCase)
  Test valid_address6() ... WARN: python does not have IPv6 support.
  (IPv6 support warning is intentional)
  ok
  test_valid_netmask (tests.unit.test_util.UtilTestCase)
  Test valid_netmask() ... ok
  test_warn (tests.unit.test_util.UtilTestCase)
  Test warn() ... WARN: test warn()
  ('WARN: test warn()' output is intentional)
  ok
  test_word_wrap (tests.unit.test_util.UtilTestCase)
  Test word_wrap() ... ok
  test_wrap_text (tests.unit.test_util.UtilTestCase)
  Test wrap_text() ... ok
  test_write_to_file (tests.unit.test_util.UtilTestCase)
  Test write_to_file() ... ok
  
  ----------------------------------------------------------------------
  Ran 45 tests in 0.301s
  
  OK
  
  ------------------
  Unit tests summary
  ------------------
  Total=8 (Passed=8, Failed=0)
  
  
  make[1]: Entering directory '«BUILDDIR»'
  rm -rf ./build
  rm -rf ./staging
  rm -rf ./tests/testarea ./tests/unit/tmp
  rm -rf ./tmp
  rm -rf ./snap
  rm -f ./locales/mo/*.mo
  rm -f ./tests/unit/*.pyc ./tests/*.pyc ./src/*.pyc
  rm -rf ./tests/unit/__pycache__ ./tests/__pycache__ ./src/__pycache__
  rm -rf ./.coverage
  rm -f ./ufw               # unittest symlink
  make[1]: Leaving directory '«BUILDDIR»'
  = Functional Tests =
  
  Performing tests 'installation/check_help'
  - installing
  - result: 
      PASS
  
  Performing tests 'installation/check_root'
  - installing
  - result: 
      PASS
  
  Performing tests 'bad/apps'
  - installing
  - result: 
      PASS
  
  Performing tests 'bad/args'
  - installing
  - result: 
      PASS
  
  Performing tests 'bad/netmasks'
  - installing
  - result: 
      PASS
  
  Performing tests 'bad/policy'
  - installing
  - result: 
      PASS
  
  Performing tests 'bugs/apps'
  - installing
  - result: 
      PASS
  
  Performing tests 'bugs/misc'
  - installing
  - result: 
      PASS
  
  Performing tests 'bugs/rules'
  - installing
  - result: 
      PASS
  
  Performing tests 'good/apps'
  - installing
  - result: 
      PASS
  
  Performing tests 'good/args'
  - installing
  - result: 
      PASS
  
  Performing tests 'good/logging'
  - installing
  - result: 
      FAIL:
  126c126
  < ### tuple ### allow_log any 443 0.0.0.0/0 any 0.0.0.0/0 in
  ---
  > ### tuple ### allow_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
  131,134d130
  < -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW ALLOW] "
  < -A ufw-user-logging-input -p udp --dport 443 -j RETURN
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
  < -A ufw-user-input -p udp --dport 443 -j ACCEPT
  334c330
  < ### tuple ### allow_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in
  ---
  > ### tuple ### allow_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
  339,342d334
  < -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW ALLOW] "
  < -A ufw-user-logging-input -p udp --dport 443 -j RETURN
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
  < -A ufw-user-input -p udp --dport 443 -j ACCEPT
  542c534
  < ### tuple ### deny_log any 443 0.0.0.0/0 any 0.0.0.0/0 in
  ---
  > ### tuple ### deny_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
  547,550d538
  < -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
  < -A ufw-user-logging-input -p udp --dport 443 -j RETURN
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
  < -A ufw-user-input -p udp --dport 443 -j DROP
  750c738
  < ### tuple ### deny_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in
  ---
  > ### tuple ### deny_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
  755,758d742
  < -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
  < -A ufw-user-logging-input -p udp --dport 443 -j RETURN
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
  < -A ufw-user-input -p udp --dport 443 -j DROP
  966c950
  < ### tuple ### limit_log any 443 0.0.0.0/0 any 0.0.0.0/0 in
  ---
  > ### tuple ### limit_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
  973,978d956
  < -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW LIMIT] "
  < -A ufw-user-logging-input -p udp --dport 443 -j RETURN
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
  < -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent --set
  < -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent --update --seconds 30 --hitcount 6 -j ufw-user-limit
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-limit-accept
  1198c1176
  < ### tuple ### limit_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in
  ---
  > ### tuple ### limit_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
  1205,1210d1182
  < -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW LIMIT] "
  < -A ufw-user-logging-input -p udp --dport 443 -j RETURN
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
  < -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent --set
  < -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent --update --seconds 30 --hitcount 6 -j ufw-user-limit
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-limit-accept
  1422c1394
  < ### tuple ### reject_log any 443 0.0.0.0/0 any 0.0.0.0/0 in
  ---
  > ### tuple ### reject_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
  1427,1430d1398
  < -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
  < -A ufw-user-logging-input -p udp --dport 443 -j RETURN
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
  < -A ufw-user-input -p udp --dport 443 -j REJECT
  1630c1598
  < ### tuple ### reject_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in
  ---
  > ### tuple ### reject_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
  1635,1638d1602
  < -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
  < -A ufw-user-logging-input -p udp --dport 443 -j RETURN
  < -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
  < -A ufw-user-input -p udp --dport 443 -j REJECT
  
  Performing tests 'good/netmasks'
  - installing
  - result: 
      PASS
  
  Performing tests 'good/policy'
  - installing
  - result: 
      PASS
  
  Performing tests 'good/reports'
  - installing
  - result: 
      PASS
  
  Performing tests 'good/route'
  - installing
  - result: 
  Command '--dry-run route allow ssh/udp' exited with '1', but expected '0'
      ** FAIL **
  
  Performing tests 'good/rules'
  - installing
  - result: 
  Command '--dry-run allow ssh/udp' exited with '1', but expected '0'
      ** FAIL **
  
  Performing tests 'ipv6/bad_args6'
  - installing
  - result: 
      PASS
  
  Performing tests 'ipv6/good_args6'
  - installing
  - result: 
      PASS
  
  Performing tests 'ipv6/logging'
  - installing
  - result: 
      PASS
  
  Performing tests 'ipv6/rules6'
  - installing
  - result: 
  Command '--dry-run allow to 2001:db8:3:4:5:6:7:8 port tftp from 2001:db8::/32 port ssh' exited with '1', but expected '0'
      ** FAIL **
  
  Performing tests 'ipv6/rules64'
  - installing
  - result: 
  Command '--dry-run allow ssh/udp' exited with '1', but expected '0'
      ** FAIL **
  
  ------------------------
  Functional tests summary
  ------------------------
  Attempted:           22 (2222 individual tests)
  Skipped:             0
  Errors:              5
  debian/rules:32: recipe for target 'install' failed
  make: *** [install] Error 1
  dpkg-buildpackage: error: fakeroot debian/rules binary gave error exit status 2

  […]

The full build log is attached.


Regards,

-- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      lamby at debian.org / chris-lamb.co.uk
       `-
-------------- next part --------------
A non-text attachment was scrubbed...
Name: ufw.0.35-2.unstable.amd64.log.txt.gz
Type: application/octet-stream
Size: 5997 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/reproducible-bugs/attachments/20161229/270b930d/attachment.obj>


More information about the Reproducible-bugs mailing list