Bug#536017: libio-socket-ssl-perl: FTBFS in lenny
ntyni at debian.org
Mon Jul 6 20:37:47 UTC 2009
On Mon, Jul 06, 2009 at 09:49:30PM +0200, Salvatore Bonaccorso wrote:
> Package: libio-socket-ssl-perl
> Version: 1.16-1
> Severity: serious
> Justification: FTBFS
> During trying to backport the bugfixes for the security bug #535946 I
> noticed that libio-socket-ssl-perl FTBFS on lenny.
> Attached is my buildlog in a up lenny cowbuilder environment.
I think the problem is this:
% openssl x509 -text -in certs/server-wildcard.pem|grep -A2 Validity
Not Before: Feb 22 08:06:33 2008 GMT
Not After : Feb 21 08:06:33 2009 GMT
Looking at the changelog, the test certificates were renewed upstream
in 1.23 and 1.24. That doesn't help us much, cherry-picking those will
only lead to another timebomb in the future.
I suggest disabling (most of?) the tests for the lenny security upload.
As for sid/squeeze, I think the best thing to do would be to work
with upstream to make the test suite automatically generate the test
certificates during the build.
Niko Tyni ntyni at debian.org
More information about the pkg-perl-maintainers