Bug#849628: ufw: FTBFS: Command '--dry-run route allow ssh/udp' exited with '1', but expected '0'
Chris Lamb
lamby at debian.org
Thu Dec 29 09:10:12 UTC 2016
Source: ufw
Version: 0.35-2
Severity: serious
Justification: fails to build from source
User: reproducible-builds at lists.alioth.debian.org
Usertags: ftbfs
X-Debbugs-Cc: reproducible-bugs at lists.alioth.debian.org
Dear Maintainer,
ufw fails to build from source in unstable/amd64:
[…]
test_get_iptables_version (tests.unit.test_util.UtilTestCase)
Test get_iptables_version() ... ok
test_get_netfilter_capabilities (tests.unit.test_util.UtilTestCase)
Test get_netfilter_capabilities() ... ok
test_get_netstat_output (tests.unit.test_util.UtilTestCase)
Test get_netstat_output() ... (TODO: fake-netstat) could not find tcp in:
(TODO: fake-netstat) could not find udp in:
(TODO: fake-netstat) could not find tcp in:
(TODO: fake-netstat) could not find udp in:
ok
test_get_ppid (tests.unit.test_util.UtilTestCase)
Test get_ppid() ... ok
test_get_services_proto (tests.unit.test_util.UtilTestCase)
Test get_services_proto() ... ok
test_hex_decode (tests.unit.test_util.UtilTestCase)
Test hex_decode() output ... ok
test_hex_encode (tests.unit.test_util.UtilTestCase)
Test hex_encode() output ... ok
test_human_sort (tests.unit.test_util.UtilTestCase)
Test human_sort() ... ok
test_in_network (tests.unit.test_util.UtilTestCase)
Test in_network() ... ok
test_msg (tests.unit.test_util.UtilTestCase)
Test msg() ... test msg()
('test msg()' output is intentional)
test msg()
('test msg()' output is intentional)
ok
test_normalize_address_host_netmask (tests.unit.test_util.UtilTestCase)
Test normalize_address() with host_netmask ... ok
test_normalize_address_invalid_netmask (tests.unit.test_util.UtilTestCase)
Test normalize_address() with invalid_netmask ... ok
test_normalize_address_ipv6_cidr (tests.unit.test_util.UtilTestCase)
Test normalize_address() with ipv6_cidr ... ok
test_normalize_address_ipv6_short_notation (tests.unit.test_util.UtilTestCase)
Test normalize_address() with ipv6_short_notation ... ok
test_normalize_address_netmask_to_cidr (tests.unit.test_util.UtilTestCase)
Test normalize_address() with netmask_to_cidr ... ok
test_normalize_address_valid_netmask_to_non_cidr (tests.unit.test_util.UtilTestCase)
Test normalize_address() with valid_netmask_to_non_cidr ... ok
test_open_file_read (tests.unit.test_util.UtilTestCase)
Test open_file_read() ... ok
test_open_files (tests.unit.test_util.UtilTestCase)
Test open_files() ... ok
test_parse_netstat_output (tests.unit.test_util.UtilTestCase)
Test parse_netstat_output() ... ok
test_parse_port_proto (tests.unit.test_util.UtilTestCase)
Test parse_port_proto() ... ok
test_under_ssh (tests.unit.test_util.UtilTestCase)
Test under_ssh() ... WARN: Couldn't find pid (is /proc mounted?)
ok
test_valid_address (tests.unit.test_util.UtilTestCase)
Test valid_address() ... ok
test_valid_address4 (tests.unit.test_util.UtilTestCase)
Test valid_address4() ... ok
test_valid_address6 (tests.unit.test_util.UtilTestCase)
Test valid_address6() ... WARN: python does not have IPv6 support.
(IPv6 support warning is intentional)
ok
test_valid_netmask (tests.unit.test_util.UtilTestCase)
Test valid_netmask() ... ok
test_warn (tests.unit.test_util.UtilTestCase)
Test warn() ... WARN: test warn()
('WARN: test warn()' output is intentional)
ok
test_word_wrap (tests.unit.test_util.UtilTestCase)
Test word_wrap() ... ok
test_wrap_text (tests.unit.test_util.UtilTestCase)
Test wrap_text() ... ok
test_write_to_file (tests.unit.test_util.UtilTestCase)
Test write_to_file() ... ok
----------------------------------------------------------------------
Ran 45 tests in 0.301s
OK
------------------
Unit tests summary
------------------
Total=8 (Passed=8, Failed=0)
make[1]: Entering directory '«BUILDDIR»'
rm -rf ./build
rm -rf ./staging
rm -rf ./tests/testarea ./tests/unit/tmp
rm -rf ./tmp
rm -rf ./snap
rm -f ./locales/mo/*.mo
rm -f ./tests/unit/*.pyc ./tests/*.pyc ./src/*.pyc
rm -rf ./tests/unit/__pycache__ ./tests/__pycache__ ./src/__pycache__
rm -rf ./.coverage
rm -f ./ufw # unittest symlink
make[1]: Leaving directory '«BUILDDIR»'
= Functional Tests =
Performing tests 'installation/check_help'
- installing
- result:
PASS
Performing tests 'installation/check_root'
- installing
- result:
PASS
Performing tests 'bad/apps'
- installing
- result:
PASS
Performing tests 'bad/args'
- installing
- result:
PASS
Performing tests 'bad/netmasks'
- installing
- result:
PASS
Performing tests 'bad/policy'
- installing
- result:
PASS
Performing tests 'bugs/apps'
- installing
- result:
PASS
Performing tests 'bugs/misc'
- installing
- result:
PASS
Performing tests 'bugs/rules'
- installing
- result:
PASS
Performing tests 'good/apps'
- installing
- result:
PASS
Performing tests 'good/args'
- installing
- result:
PASS
Performing tests 'good/logging'
- installing
- result:
FAIL:
126c126
< ### tuple ### allow_log any 443 0.0.0.0/0 any 0.0.0.0/0 in
---
> ### tuple ### allow_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
131,134d130
< -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW ALLOW] "
< -A ufw-user-logging-input -p udp --dport 443 -j RETURN
< -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
< -A ufw-user-input -p udp --dport 443 -j ACCEPT
334c330
< ### tuple ### allow_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in
---
> ### tuple ### allow_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
339,342d334
< -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW ALLOW] "
< -A ufw-user-logging-input -p udp --dport 443 -j RETURN
< -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
< -A ufw-user-input -p udp --dport 443 -j ACCEPT
542c534
< ### tuple ### deny_log any 443 0.0.0.0/0 any 0.0.0.0/0 in
---
> ### tuple ### deny_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
547,550d538
< -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
< -A ufw-user-logging-input -p udp --dport 443 -j RETURN
< -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
< -A ufw-user-input -p udp --dport 443 -j DROP
750c738
< ### tuple ### deny_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in
---
> ### tuple ### deny_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
755,758d742
< -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
< -A ufw-user-logging-input -p udp --dport 443 -j RETURN
< -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
< -A ufw-user-input -p udp --dport 443 -j DROP
966c950
< ### tuple ### limit_log any 443 0.0.0.0/0 any 0.0.0.0/0 in
---
> ### tuple ### limit_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
973,978d956
< -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW LIMIT] "
< -A ufw-user-logging-input -p udp --dport 443 -j RETURN
< -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
< -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent --set
< -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent --update --seconds 30 --hitcount 6 -j ufw-user-limit
< -A ufw-user-input -p udp --dport 443 -j ufw-user-limit-accept
1198c1176
< ### tuple ### limit_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in
---
> ### tuple ### limit_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
1205,1210d1182
< -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW LIMIT] "
< -A ufw-user-logging-input -p udp --dport 443 -j RETURN
< -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
< -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent --set
< -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent --update --seconds 30 --hitcount 6 -j ufw-user-limit
< -A ufw-user-input -p udp --dport 443 -j ufw-user-limit-accept
1422c1394
< ### tuple ### reject_log any 443 0.0.0.0/0 any 0.0.0.0/0 in
---
> ### tuple ### reject_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
1427,1430d1398
< -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
< -A ufw-user-logging-input -p udp --dport 443 -j RETURN
< -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
< -A ufw-user-input -p udp --dport 443 -j REJECT
1630c1598
< ### tuple ### reject_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in
---
> ### tuple ### reject_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
1635,1638d1602
< -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
< -A ufw-user-logging-input -p udp --dport 443 -j RETURN
< -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
< -A ufw-user-input -p udp --dport 443 -j REJECT
Performing tests 'good/netmasks'
- installing
- result:
PASS
Performing tests 'good/policy'
- installing
- result:
PASS
Performing tests 'good/reports'
- installing
- result:
PASS
Performing tests 'good/route'
- installing
- result:
Command '--dry-run route allow ssh/udp' exited with '1', but expected '0'
** FAIL **
Performing tests 'good/rules'
- installing
- result:
Command '--dry-run allow ssh/udp' exited with '1', but expected '0'
** FAIL **
Performing tests 'ipv6/bad_args6'
- installing
- result:
PASS
Performing tests 'ipv6/good_args6'
- installing
- result:
PASS
Performing tests 'ipv6/logging'
- installing
- result:
PASS
Performing tests 'ipv6/rules6'
- installing
- result:
Command '--dry-run allow to 2001:db8:3:4:5:6:7:8 port tftp from 2001:db8::/32 port ssh' exited with '1', but expected '0'
** FAIL **
Performing tests 'ipv6/rules64'
- installing
- result:
Command '--dry-run allow ssh/udp' exited with '1', but expected '0'
** FAIL **
------------------------
Functional tests summary
------------------------
Attempted: 22 (2222 individual tests)
Skipped: 0
Errors: 5
debian/rules:32: recipe for target 'install' failed
make: *** [install] Error 1
dpkg-buildpackage: error: fakeroot debian/rules binary gave error exit status 2
[…]
The full build log is attached.
Regards,
--
,''`.
: :' : Chris Lamb
`. `'` lamby at debian.org / chris-lamb.co.uk
`-
-------------- next part --------------
A non-text attachment was scrubbed...
Name: ufw.0.35-2.unstable.amd64.log.txt.gz
Type: application/octet-stream
Size: 5997 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/reproducible-bugs/attachments/20161229/270b930d/attachment.obj>
More information about the Reproducible-bugs
mailing list