• Bug#1103256: golang-github-smallstep-crypto: FTBFS during tests when bu

    From =?utf-8?b?SsOpcsOpbXkgTGFs?=@21:1/5 to All on Tue Apr 15 20:00:02 2025
    Source: golang-github-smallstep-crypto
    Version: 0.57.0-1
    Severity: serious
    Tags: ftbfs

    This is

    https://ci.debian.net/packages/g/golang-github-smallstep-certificates/testing/amd64/59900165/

    143s # github.com/smallstep/certificates/authority/provisioner [github.com/smallstep/certificates/authority/provisioner.test]
    143s src/github.com/smallstep/certificates/authority/provisioner/nebula_test.go:58:20: not enough arguments in call to nc.Sign
    143s have ("crypto/ed25519".PrivateKey)
    143s want (cert.Curve, []byte)

    So i'm proposing to import an upstream patch to fix that test,
    and tighten the dependency on nebula to >= 1.9.3~.


    -- System Information:
    Debian Release: trixie/sid
    APT prefers unstable
    APT policy: (500, 'unstable'), (500, 'testing')
    Architecture: amd64 (x86_64)

    Kernel: Linux 6.12.22-amd64 (SMP w/4 CPU threads; PREEMPT)
    Locale: LANG=fr_FR.utf8, LC_CTYPE=fr_FR.utf8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash
    Init: systemd (via /run/systemd/system)
    LSM: AppArmor: enabled

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Debian Bug Tracking System@21:1/5 to All on Tue Apr 15 20:30:01 2025
    This is a multi-part message in MIME format...

    Your message dated Tue, 15 Apr 2025 18:19:29 +0000
    with message-id <E1u4ksb-009NDW-Um@fasolo.debian.org>
    and subject line Bug#1103256: fixed in golang-github-smallstep-certificates 0.20.0-5
    has caused the Debian Bug report #1103256,
    regarding golang-github-smallstep-crypto: FTBFS during tests when built with nebula >= 1.9.3
    to be marked as done.

    This means that you claim that the problem has been dealt with.
    If this is not the case it is now your responsibility to reopen the
    Bug report if necessary, and/or fix the problem forthwith.

    (NB: If you are a system administrator and have no idea what this
    message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org
    immediately.)


    --
    1103256: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103256
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems

    Received: (at submit) by bugs.debian.org; 15 Apr 2025 17:52:14 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.6-bugs.debian.org_2005_01_02
    (2021-04-09) on buxtehude.debian.org
    X-Spam-Level:
    X-Spam-Status: No, score=-7.9 required=4.0 tests=BAYES_00,DKIM_SIGNED,
    DKIM_VALID,DKIM_VALID_AU,FOURLA,HEADER_FROM_DIFFERENT_DOMAINS,
    RCVD_IN_DNSWL_MED,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_PASS,
    SPF_PASS,XMAILER_REPORTBUG autolearn=ham autolearn_force=no
    version=3.4.6-bugs.debian.org_2005_01_02
    X-Spam-Bayes: score:0.0000 Tokens: new, 22; hammy, 150; neutral, 83; spammy,
    0. spammytokens: hammytokens:0.000-+--trixie, 0.000-+--sk:golang,
    0.000-+--sk:golang-, 0.000-+--H*M:reportbug, 0.000-+--H*MI:reportbug Return-path: <SRS0=dQAX=XB=melix.org=kapouer@bounces.m4x.org>
    Received: from mx1.polytechnique.org ([129.104.30.34]:38596)
    by buxtehude.debian.org w