[Pkg-utopia-maintainers] Bug#1086466: ostree: FTBFS: ERROR: tests/test-remote-gpg-list-keys.sh

Santiago Vila sanvila at debian.org
Wed Oct 30 21:39:02 GMT 2024


Package: src:ostree
Version: 2024.8-1
Severity: serious
Tags: ftbfs

Dear maintainer:

During a rebuild of all packages in unstable, your package failed to build:

--------------------------------------------------------------------------------
[...]
  debian/rules binary
dh binary
    dh_update_autotools_config
    debian/rules override_dh_autoreconf
make[1]: Entering directory '/<<PKGBUILDDIR>>'
mkdir -p debian/tmp-path
env NOCONFIGURE=1 PATH=/<<PKGBUILDDIR>>/debian/tmp-path:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games dh_autoreconf ./autogen.sh
autoreconf: export WARNINGS=
autoreconf: Entering directory '.'
autoreconf: configure.ac: not using Gettext
autoreconf: running: aclocal --force -I buildutil -I libglnx ${ACLOCAL_FLAGS}
autoreconf: configure.ac: tracing
autoreconf: running: libtoolize --copy --force
libtoolize: putting auxiliary files in AC_CONFIG_AUX_DIR, 'build-aux'.

[... snipped ...]

+ '[' uid = fpr ']'
+ IFS=:
+ read -a fields
+ '[' sec = sec ']'
+ '[' -z A25C19F9E5613671 ']'
+ key2_id=4983E32424B34CD8
+ IFS=:
+ read -a fields
+ '[' fpr = sec ']'
+ '[' fpr = ssb ']'
+ '[' fpr = fpr ']'
+ '[' -z AADA0A6CAD88352E79D0AEB2A25C19F9E5613671 ']'
+ '[' -z '' ']'
+ key2_fpr=E4570B6DEEDD21E65788BDCC4983E32424B34CD8
+ IFS=:
+ read -a fields
+ '[' grp = sec ']'
+ '[' grp = ssb ']'
+ '[' grp = fpr ']'
+ IFS=:
+ read -a fields
+ '[' uid = sec ']'
+ '[' uid = ssb ']'
+ '[' uid = fpr ']'
+ IFS=:
+ read -a fields
+ '[' ssb = sec ']'
+ '[' ssb = ssb ']'
+ key2_sub_id=705CAEA31A31929A
+ IFS=:
+ read -a fields
+ '[' fpr = sec ']'
+ '[' fpr = ssb ']'
+ '[' fpr = fpr ']'
+ '[' -z AADA0A6CAD88352E79D0AEB2A25C19F9E5613671 ']'
+ '[' -z E4570B6DEEDD21E65788BDCC4983E32424B34CD8 ']'
+ key2_sub_fpr=63745F6A9210FC9765BF1B1F705CAEA31A31929A
+ IFS=:
+ read -a fields
+ '[' grp = sec ']'
+ '[' grp = ssb ']'
+ '[' grp = fpr ']'
+ IFS=:
+ read -a fields
+ ostree --repo=/var/tmp/tap-test.RUfrYl/repo commit -b test2 -s 'A GPG signed commit' -m 'Signed commit body' --tree=dir=files --gpg-homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --gpg-sign=A25C19F9E5613671 --gpg-sign=705CAEA31A31929A
+ ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2
+ assert_file_has_content test2-show '^Found 2 signatures'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e '^Found 2 signatures' test2-show
+ assert_file_has_content test2-show 'public key not found'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'public key not found' test2-show
+ assert_file_has_content test2-show A25C19F9E5613671
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e A25C19F9E5613671 test2-show
+ assert_file_has_content test2-show 705CAEA31A31929A
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 705CAEA31A31929A test2-show
+ echo 'ok signed with both generated keys'
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --export A25C19F9E5613671 4983E32424B34CD8
+ ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2
+ assert_file_has_content test2-show '^Found 2 signatures'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e '^Found 2 signatures' test2-show
+ assert_not_file_has_content test2-show 'public key not found'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'public key not found' test2-show
+ assert_file_has_content test2-show A25C19F9E5613671
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e A25C19F9E5613671 test2-show
+ assert_file_has_content test2-show 705CAEA31A31929A
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 705CAEA31A31929A test2-show
+ assert_file_has_content test2-show 'Good signature from "Test Key 1 <>"'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Good signature from "Test Key 1 <>"' test2-show
+ assert_file_has_content test2-show 'Good signature from "Test Key 2 <>"'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Good signature from "Test Key 2 <>"' test2-show
+ assert_file_has_content test2-show 'Primary key ID 4983E32424B34CD8'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Primary key ID 4983E32424B34CD8' test2-show
+ echo 'ok verified both generated keys'
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --quick-set-expire AADA0A6CAD88352E79D0AEB2A25C19F9E5613671 seconds=1
+ sleep 2
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --export A25C19F9E5613671 4983E32424B34CD8
+ ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2
+ assert_file_has_content test2-show '^Found 2 signatures'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e '^Found 2 signatures' test2-show
+ assert_not_file_has_content test2-show 'public key not found'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'public key not found' test2-show
+ assert_file_has_content test2-show A25C19F9E5613671
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e A25C19F9E5613671 test2-show
+ assert_file_has_content test2-show 705CAEA31A31929A
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 705CAEA31A31929A test2-show
+ assert_file_has_content test2-show 'BAD signature from "Test Key 1 <>"'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'BAD signature from "Test Key 1 <>"' test2-show
+ assert_file_has_content test2-show 'Key expired'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Key expired' test2-show
+ assert_file_has_content test2-show 'Good signature from "Test Key 2 <>"'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Good signature from "Test Key 2 <>"' test2-show
+ assert_file_has_content test2-show 'Primary key ID 4983E32424B34CD8'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Primary key ID 4983E32424B34CD8' test2-show
+ echo 'ok verified with key1 expired'
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --quick-set-expire AADA0A6CAD88352E79D0AEB2A25C19F9E5613671 seconds=0
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --quick-set-expire E4570B6DEEDD21E65788BDCC4983E32424B34CD8 seconds=1
+ sleep 2
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --export A25C19F9E5613671 4983E32424B34CD8
+ ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2
+ assert_file_has_content test2-show '^Found 2 signatures'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e '^Found 2 signatures' test2-show
+ assert_not_file_has_content test2-show 'public key not found'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'public key not found' test2-show
+ assert_file_has_content test2-show A25C19F9E5613671
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e A25C19F9E5613671 test2-show
+ assert_file_has_content test2-show 705CAEA31A31929A
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 705CAEA31A31929A test2-show
+ assert_file_has_content test2-show 'Good signature from "Test Key 1 <>"'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Good signature from "Test Key 1 <>"' test2-show
+ assert_file_has_content test2-show 'BAD signature from "Test Key 2 <>"'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'BAD signature from "Test Key 2 <>"' test2-show
+ assert_file_has_content test2-show 'Primary key ID 4983E32424B34CD8'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Primary key ID 4983E32424B34CD8' test2-show
+ assert_file_has_content test2-show 'Primary key expired'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Primary key expired' test2-show
+ echo 'ok verified with key2 primary expired'
+ false
+ echo 'ok # SKIP gpg --quick-set-expire does not support expiring subkeys'
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --quick-set-expire E4570B6DEEDD21E65788BDCC4983E32424B34CD8 seconds=0
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --export A25C19F9E5613671 4983E32424B34CD8
+ false
+ echo 'ok # SKIP gpg --quick-set-expire does not support expiring subkeys'
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --batch --passphrase '' --quick-add-key E4570B6DEEDD21E65788BDCC4983E32424B34CD8 rsa2048 sign never
++ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --list-secret-keys --with-colons
gpg: checking the trustdb
gpg: marginals needed: 3  completes needed: 1  trust model: pgp
gpg: depth: 0  valid:   2  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 2u
+ gpg_seckey_listing='sec:u:2048:1:A25C19F9E5613671:1730309711:::u:::scSC:::+:::23::0:
fpr:::::::::AADA0A6CAD88352E79D0AEB2A25C19F9E5613671:
grp:::::::::77D9998F239E0596CA32FA15F31CB1F7AC81CC78:
uid:u::::1730309714::0987136B4D556952807B51F8BB0AAF7E845BCA85::Test Key 1::::::::::0:
sec:u:2048:1:4983E32424B34CD8:1730309711:::u:::scSC:::+:::23::0:
fpr:::::::::E4570B6DEEDD21E65788BDCC4983E32424B34CD8:
grp:::::::::0ED4377F74BD3881385FB26A149838CC3008B1A2:
uid:u::::1730309716::88A002D8DE3362C644091841F91A088A637827FE::Test Key 2::::::::::0:
ssb:u:2048:1:705CAEA31A31929A:1730309711::::::s:::+:::23:
fpr:::::::::63745F6A9210FC9765BF1B1F705CAEA31A31929A:
grp:::::::::9678A9CC5C6700A2DB4331883B5BE96E21DBC50B:
ssb:u:2048:1:C98EB3524FA3BC24:1730309716::::::s:::+:::23:
fpr:::::::::7536E948EC58972D5B13C42CC98EB3524FA3BC24:
grp:::::::::0690238CC4BB2B4F1051B60ED18923DCF74399E9:'
++ tail -n1
++ awk -F: '{if ($1 == "ssb") print $5}'
+ key2_sub2_id=C98EB3524FA3BC24
++ tail -n1
++ awk -F: '{if ($1 == "fpr") print $10}'
+ key2_sub2_fpr=7536E948EC58972D5B13C42CC98EB3524FA3BC24
+ ostree --repo=/var/tmp/tap-test.RUfrYl/repo commit -b test2 -s 'A GPG signed commit' -m 'Signed commit body' --tree=dir=files --gpg-homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --gpg-sign=A25C19F9E5613671 --gpg-sign=C98EB3524FA3BC24
+ ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2
+ assert_file_has_content test2-show '^Found 2 signatures'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e '^Found 2 signatures' test2-show
+ assert_file_has_content test2-show A25C19F9E5613671
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e A25C19F9E5613671 test2-show
+ assert_file_has_content test2-show C98EB3524FA3BC24
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e C98EB3524FA3BC24 test2-show
+ assert_file_has_content test2-show 'Good signature from "Test Key 1 <>"'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Good signature from "Test Key 1 <>"' test2-show
+ assert_file_has_content test2-show 'public key not found'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'public key not found' test2-show
+ echo 'ok verified with key2 sub2 missing'
+ key1_rev=/var/tmp/tap-test.RUfrYl/tmpgpghome/openpgp-revocs.d/AADA0A6CAD88352E79D0AEB2A25C19F9E5613671.rev
+ '[' -f /var/tmp/tap-test.RUfrYl/tmpgpghome/openpgp-revocs.d/AADA0A6CAD88352E79D0AEB2A25C19F9E5613671.rev ']'
+ sed -i '/BEGIN PGP PUBLIC KEY BLOCK/s/^://' /var/tmp/tap-test.RUfrYl/tmpgpghome/openpgp-revocs.d/AADA0A6CAD88352E79D0AEB2A25C19F9E5613671.rev
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --import /var/tmp/tap-test.RUfrYl/tmpgpghome/openpgp-revocs.d/AADA0A6CAD88352E79D0AEB2A25C19F9E5613671.rev
gpg: key A25C19F9E5613671: "Test Key 1" revocation certificate imported
gpg: Total number processed: 1
gpg:    new key revocations: 1
gpg: marginals needed: 3  completes needed: 1  trust model: pgp
gpg: depth: 0  valid:   2  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 2u
+ gpg --homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome --export A25C19F9E5613671 4983E32424B34CD8
+ ostree --repo=/var/tmp/tap-test.RUfrYl/repo show test2
+ assert_file_has_content test2-show '^Found 2 signatures'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e '^Found 2 signatures' test2-show
+ assert_not_file_has_content test2-show 'public key not found'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'public key not found' test2-show
+ assert_file_has_content test2-show A25C19F9E5613671
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e A25C19F9E5613671 test2-show
+ assert_file_has_content test2-show C98EB3524FA3BC24
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e C98EB3524FA3BC24 test2-show
+ assert_file_has_content test2-show 'Key revoked'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Key revoked' test2-show
+ assert_file_has_content test2-show 'Good signature from "Test Key 2 <>"'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Good signature from "Test Key 2 <>"' test2-show
+ assert_file_has_content test2-show 'Primary key ID 4983E32424B34CD8'
+ fpath=test2-show
+ shift
+ for re in "$@"
+ grep -q -e 'Primary key ID 4983E32424B34CD8' test2-show
+ echo 'ok verified with key1 revoked'
+ run_exit_cmds
+ for expr in "${libtest_exit_cmds[@]}"
+ eval save_core
++ save_core
++ '[' -e core ']'
+ for expr in "${libtest_exit_cmds[@]}"
+ eval libtest_cleanup_gpg
++ libtest_cleanup_gpg
++ local gpg_homedir=/var/tmp/tap-test.RUfrYl/gpghome
++ gpg-connect-agent --homedir /var/tmp/tap-test.RUfrYl/gpghome killagent /bye
+ for expr in "${libtest_exit_cmds[@]}"
+ eval cleanup_tmpgpg_home
++ cleanup_tmpgpg_home
++ libtest_cleanup_gpg /var/tmp/tap-test.RUfrYl/tmpgpghome
++ local gpg_homedir=/var/tmp/tap-test.RUfrYl/tmpgpghome
++ gpg-connect-agent --homedir /var/tmp/tap-test.RUfrYl/tmpgpghome killagent /bye
Copying gpghome to /var/tmp/tap-test.RUfrYl
checking for xattrs.../usr/bin/setfattr
/var/tmp/tap-test.RUfrYl /var/tmp/tap-test.RUfrYl
Unable to retrieve SELinux label, assuming disabled
/var/tmp/tap-test.RUfrYl
done
checking for overlayfs whiteouts...done
1..9
e58b9c623799b28fde9bedc3e73628ba51ff73ade651e8bd270ef03d95715f12
08bf7d4b75b61a507b57db922191de303a5a3c8aa6806be3baf9c65cc3292331
fsck objects (1/23) 4%
fsck objects (23/23) 100%
object fsck of 2 commits completed successfully - no errors found.
d505505b44ce9b66b7ff7bf5bdd08493aaaed087720a73e92cbba96ac16472a7
b9ff7e879fffb6e591fa3e49b0d863399ee969d3ee13b4af952569e249344384
14946aa17d545a0616549de698adc78a7ff7cd7791fcfded69e1ec9f33cc2a3a
ok
PASS: tests/test-gpg-signed-commit.sh 1
5cc11b25806d66ee3dd3a432908387b9512bf3c57a86958004cc45235859c817
ok signed with both generated keys
PASS: tests/test-gpg-signed-commit.sh 2 signed with both generated keys
ok verified both generated keys
PASS: tests/test-gpg-signed-commit.sh 3 verified both generated keys
ok verified with key1 expired
PASS: tests/test-gpg-signed-commit.sh 4 verified with key1 expired
ok verified with key2 primary expired
PASS: tests/test-gpg-signed-commit.sh 5 verified with key2 primary expired
ok # SKIP gpg --quick-set-expire does not support expiring subkeys
SKIP: tests/test-gpg-signed-commit.sh 6 # SKIP gpg --quick-set-expire does not support expiring subkeys
ok # SKIP gpg --quick-set-expire does not support expiring subkeys
SKIP: tests/test-gpg-signed-commit.sh 7 # SKIP gpg --quick-set-expire does not support expiring subkeys
a1da9987eaeb94ba2a317cd6b1539e40ff04a9a04d4b39e89042a6ae98effe3f
ok verified with key2 sub2 missing
PASS: tests/test-gpg-signed-commit.sh 8 verified with key2 sub2 missing
ok verified with key1 revoked
PASS: tests/test-gpg-signed-commit.sh 9 verified with key1 revoked
OK closing connection
OK closing connection

SKIP: tests/test-rofiles-fuse.sh
================================

# testlabel.txt: security.selinux: No such attribute
++ BUILT_WITH_ASAN=
++ test -n ''
++ CMD_PREFIX=
++ test -n ''
++ test -z ''
++ OSTREE_HTTPD=/<<PKGBUILDDIR>>/ostree-trivial-httpd
++ '[' -x /<<PKGBUILDDIR>>/ostree-trivial-httpd ']'
++ _have_user_xattrs=
++ _have_systemd_and_libmount=
++ _have_strace_fault_injection=
++ libtest_exit_cmds+=(libtest_cleanup_gpg)
++ ED25519PUBLIC=
++ ED25519SEED=
++ ED25519SECRET=
+ skip_without_fuse
+ fusermount --version
+ grep -q 'Bounding set.*[^a-z]cap_sys_admin'
+ capsh --print
/<<PKGBUILDDIR>>/tests/libtest.sh: line 692: capsh: command not found
+ skip 'No cap_sys_admin in bounding set, can'\''t use FUSE'
+ echo '1..0 # SKIP' 'No cap_sys_admin in bounding set, can'\''t use FUSE'
+ exit 0
+ run_exit_cmds
+ for expr in "${libtest_exit_cmds[@]}"
+ eval save_core
++ save_core
++ '[' -e core ']'
+ for expr in "${libtest_exit_cmds[@]}"
+ eval libtest_cleanup_gpg
++ libtest_cleanup_gpg
++ local gpg_homedir=/var/tmp/tap-test.FPEM7a/gpghome
++ gpg-connect-agent --homedir /var/tmp/tap-test.FPEM7a/gpghome killagent /bye
gpg-connect-agent: no running gpg-agent - starting '/usr/bin/gpg-agent'
gpg-connect-agent: waiting for the agent to come up ... (5s)
gpg-connect-agent: connection to agent established
Copying gpghome to /var/tmp/tap-test.FPEM7a
checking for xattrs.../usr/bin/setfattr
/var/tmp/tap-test.FPEM7a /var/tmp/tap-test.FPEM7a
Unable to retrieve SELinux label, assuming disabled
/var/tmp/tap-test.FPEM7a
done
checking for overlayfs whiteouts...done
1..0 # SKIP No cap_sys_admin in bounding set, can't use FUSE
SKIP: tests/test-rofiles-fuse.sh - No cap_sys_admin in bounding set, can't use FUSE
OK closing connection

SKIP: tests/coccinelle.sh
=========================

# testlabel.txt: security.selinux: No such attribute
++ BUILT_WITH_ASAN=
++ test -n ''
++ CMD_PREFIX=
++ test -n ''
++ test -z ''
++ OSTREE_HTTPD=/<<PKGBUILDDIR>>/ostree-trivial-httpd
++ '[' -x /<<PKGBUILDDIR>>/ostree-trivial-httpd ']'
++ _have_user_xattrs=
++ _have_systemd_and_libmount=
++ _have_strace_fault_injection=
++ libtest_exit_cmds+=(libtest_cleanup_gpg)
++ ED25519PUBLIC=
++ ED25519SEED=
++ ED25519SECRET=
+ spatch --version
+ skip 'no spatch; get it from http://coccinelle.lip6.fr/'
+ echo '1..0 # SKIP' 'no spatch; get it from http://coccinelle.lip6.fr/'
+ exit 0
+ run_exit_cmds
+ for expr in "${libtest_exit_cmds[@]}"
+ eval save_core
++ save_core
++ '[' -e core ']'
+ for expr in "${libtest_exit_cmds[@]}"
+ eval libtest_cleanup_gpg
++ libtest_cleanup_gpg
++ local gpg_homedir=/var/tmp/tap-test.dDVgxE/gpghome
++ gpg-connect-agent --homedir /var/tmp/tap-test.dDVgxE/gpghome killagent /bye
gpg-connect-agent: no running gpg-agent - starting '/usr/bin/gpg-agent'
gpg-connect-agent: waiting for the agent to come up ... (5s)
gpg-connect-agent: connection to agent established
Copying gpghome to /var/tmp/tap-test.dDVgxE
checking for xattrs.../usr/bin/setfattr
/var/tmp/tap-test.dDVgxE /var/tmp/tap-test.dDVgxE
Unable to retrieve SELinux label, assuming disabled
/var/tmp/tap-test.dDVgxE
done
checking for overlayfs whiteouts...done
1..0 # SKIP no spatch; get it from http://coccinelle.lip6.fr/
SKIP: tests/coccinelle.sh - no spatch; get it from http://coccinelle.lip6.fr/
OK closing connection

============================================================================
Testsuite summary for libostree 2024.8
============================================================================
# TOTAL: 960
# PASS:  912
# SKIP:  46
# XFAIL: 0
# FAIL:  0
# XPASS: 0
# ERROR: 2
============================================================================
See ./test-suite.log
Please report to walters at verbum.org
============================================================================
make[6]: *** [Makefile:8284: test-suite.log] Error 1
make[6]: Leaving directory '/<<PKGBUILDDIR>>'
make[5]: *** [Makefile:8392: check-TESTS] Error 2
make[5]: Leaving directory '/<<PKGBUILDDIR>>'
make[4]: *** [Makefile:9615: check-am] Error 2
make[4]: Leaving directory '/<<PKGBUILDDIR>>'
make[3]: *** [Makefile:8169: check-recursive] Error 1
make[3]: Leaving directory '/<<PKGBUILDDIR>>'
make[2]: *** [Makefile:9618: check] Error 2
make[2]: Leaving directory '/<<PKGBUILDDIR>>'
make[1]: *** [debian/rules:64: override_dh_auto_test-arch] Error 1
make[1]: Leaving directory '/<<PKGBUILDDIR>>'
make: *** [debian/rules:8: binary] Error 2
dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2
--------------------------------------------------------------------------------

The above is just how the build ends and not necessarily the most relevant part.
If required, the full build log is available here:

https://people.debian.org/~sanvila/build-logs/202410/

About the archive rebuild: The build was made on virtual machines from AWS,
using sbuild and a reduced chroot with only build-essential packages.

If you could not reproduce the bug please contact me privately, as I
am willing to provide ssh access to a virtual machine where the bug is
fully reproducible.

If this is really a bug in one of the build-depends, please use
reassign and affects, so that this is still visible in the BTS web
page for this package.

Thanks.



More information about the Pkg-utopia-maintainers mailing list