Bug#536017: libio-socket-ssl-perl: FTBFS in lenny

Niko Tyni ntyni at debian.org
Mon Jul 6 20:37:47 UTC 2009


On Mon, Jul 06, 2009 at 09:49:30PM +0200, Salvatore Bonaccorso wrote:
> Package: libio-socket-ssl-perl
> Version: 1.16-1
> Severity: serious
> Justification: FTBFS
> 
> During trying to backport the bugfixes for the security bug #535946 I
> noticed that libio-socket-ssl-perl FTBFS on lenny.
> 
> Attached is my buildlog in a up lenny cowbuilder environment.

I think the problem is this:

% openssl x509 -text -in certs/server-wildcard.pem|grep -A2 Validity
        Validity
            Not Before: Feb 22 08:06:33 2008 GMT
            Not After : Feb 21 08:06:33 2009 GMT

Looking at the changelog, the test certificates were renewed upstream
in 1.23 and 1.24.  That doesn't help us much, cherry-picking those will
only lead to another timebomb in the future.

I suggest disabling (most of?) the tests for the lenny security upload.

As for sid/squeeze, I think the best thing to do would be to work
with upstream to make the test suite automatically generate the test
certificates during the build.

Cheers,
-- 
Niko Tyni   ntyni at debian.org





More information about the pkg-perl-maintainers mailing list