Debian Bug report logs -
#729328
FTBFS: test failure on armel
Reported by: Dima Kogan <dima@secretsauce.net>
Date: Mon, 11 Nov 2013 20:42:07 UTC
Severity: serious
Found in version tcpflow/1.4.0+repack1-2
Fixed in version tcpflow/1.4.3+repack1-1
Done: Dima Kogan <dima@secretsauce.net>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org:
Bug#729328; Package src:tcpflow.
(Mon, 11 Nov 2013 20:42:11 GMT) (full text, mbox, link).
Acknowledgement sent
to Dima Kogan <dima@secretsauce.net>:
New Bug report received and forwarded.
(Mon, 11 Nov 2013 20:42:12 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: tcpflow
Version: 1.4.0+repack1-2
Severity: normal
On armel I see
============================================================================
Testsuite summary for TCPFLOW 1.4.0
============================================================================
# TOTAL: 3
# PASS: 1
# SKIP: 0
make[4]: *** [test-suite.log] Error 1
# XFAIL: 0
# FAIL: 2
# XPASS: 0
# ERROR: 0
============================================================================
See tests/test-suite.log
Please report to bugs@afflib.org
Severity set to 'serious' from 'normal'
Request was from Andreas Beckmann <anbe@debian.org>
to control@bugs.debian.org.
(Sun, 01 Dec 2013 02:36:05 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org:
Bug#729328; Package src:tcpflow.
(Sat, 07 Dec 2013 08:21:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Dima Kogan <dima@secretsauce.net>:
Extra info received and forwarded to list.
(Sat, 07 Dec 2013 08:21:05 GMT) (full text, mbox, link).
Message #12 received at 729328@bugs.debian.org (full text, mbox, reply):
tags 729328 pending
thanks
The 1.4.3 upstream release has resolved this. Tested in a qemu chroot.
Added tag(s) pending.
Request was from Dima Kogan <dima@secretsauce.net>
to control@bugs.debian.org.
(Sat, 07 Dec 2013 08:21:11 GMT) (full text, mbox, link).
Reply sent
to Dima Kogan <dima@secretsauce.net>:
You have taken responsibility.
(Sun, 08 Dec 2013 03:24:09 GMT) (full text, mbox, link).
Notification sent
to Dima Kogan <dima@secretsauce.net>:
Bug acknowledged by developer.
(Sun, 08 Dec 2013 03:24:09 GMT) (full text, mbox, link).
Message #19 received at 729328-close@bugs.debian.org (full text, mbox, reply):
Source: tcpflow
Source-Version: 1.4.3+repack1-1
We believe that the bug you reported is fixed in the latest version of
tcpflow, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 729328@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Dima Kogan <dima@secretsauce.net> (supplier of updated tcpflow package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 07 Dec 2013 11:03:08 -0800
Source: tcpflow
Binary: tcpflow tcpflow-dbg
Architecture: source amd64
Version: 1.4.3+repack1-1
Distribution: unstable
Urgency: low
Maintainer: Dima Kogan <dima@secretsauce.net>
Changed-By: Dima Kogan <dima@secretsauce.net>
Description:
tcpflow - TCP flow recorder
tcpflow-dbg - TCP flow recorder - debug symbols
Closes: 729328
Changes:
tcpflow (1.4.3+repack1-1) unstable; urgency=low
.
* Upstream update to 1.4.3 (Closes: #729328)
* Using in-debian libhttp-parser instead of the in-tree one
Checksums-Sha1:
67dc282f94e068e43d826f6f15b92da5fc4cd96c 1691 tcpflow_1.4.3+repack1-1.dsc
d96d2af304c340dcfc7054cf32db6fa10cc57b79 516543 tcpflow_1.4.3+repack1.orig.tar.gz
f565542a2e3e99e39fc4bcafa72bf226db524e70 10372 tcpflow_1.4.3+repack1-1.debian.tar.gz
972dd7597efb1d3243b38a7200b4bcf86ec2f4d0 285768 tcpflow_1.4.3+repack1-1_amd64.deb
6e16d1fed54b3351b86773a90b2caf3f1005bb1f 5499652 tcpflow-dbg_1.4.3+repack1-1_amd64.deb
Checksums-Sha256:
b47c5c2f0fd7747a03a5272d8bfb197d2761603c789fe06ec11aeac4b4996a99 1691 tcpflow_1.4.3+repack1-1.dsc
9ae6024b52ce852565170963ea878db5ef925a042b4a9dc0f347ac6466efca72 516543 tcpflow_1.4.3+repack1.orig.tar.gz
48169bad7a79a66e92e2b1bc96596f00948e1a7cc198295054ab6cea41e490c9 10372 tcpflow_1.4.3+repack1-1.debian.tar.gz
b48043294036b0207688c7aee82b7c2914f2de04fe4a0bf7a53b4f9d68762700 285768 tcpflow_1.4.3+repack1-1_amd64.deb
ab4ee498429ae668049a8eb6e5e2551479e332381c87309a9a391fe483cb9b09 5499652 tcpflow-dbg_1.4.3+repack1-1_amd64.deb
Files:
3cedd0195c2d9ee46cb61439b1b8008b 1691 net optional tcpflow_1.4.3+repack1-1.dsc
915da5e8a70848fb62e0c7f3de6f2182 516543 net optional tcpflow_1.4.3+repack1.orig.tar.gz
0bcd55eb47197cd694dd7009b852f916 10372 net optional tcpflow_1.4.3+repack1-1.debian.tar.gz
32535c0d52360564cfa9fb248b41e230 285768 net optional tcpflow_1.4.3+repack1-1_amd64.deb
fee6f630e15e4d803fdafc764bde00b5 5499652 debug extra tcpflow-dbg_1.4.3+repack1-1_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iQEcBAEBCgAGBQJSo9EEAAoJEADolDnyKCkr1O4IAIWRiIG/sOIwx5VDIXtyOzc3
mQKkXAP5tiRXb3Qg6p7Lpou+iaOeqeZXidOJhrw6ixEjzCyBqWYOVRzLqiVX5kOw
njtmRZ/F86wGN1qiTTKnjPvOGF11X0TgwLvteBHLR1EJONEQJSnFeOzn/8Dk+m7+
Y0Ot8Ws3NueBf6ynXbkFaUt+k9oLl4H12eyOO7xUTZ8zNIF3j3GAToSHBAlqvHGj
eLs0IAd0p0pD5TLtRjEHWbv8aT3VDi7dgxGo2sMrbhdteegSIO9XC0gtrIs0QGbP
SLuaRD/78+xRRvSVOaG+A5/URm4f6Tr15Ymca+yYPNI11lTMiIASIx5GFaX6Qy8=
=6QyL
-----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Sun, 05 Jan 2014 07:27:25 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Sun Jul 2 03:29:22 2023;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.