Merge ~paelzer/ubuntu/+source/ruby2.5:merge-disco-2.5.3-3ubuntu1 into ubuntu/+source/ruby2.5:debian/sid
- Git
- lp:~paelzer/ubuntu/+source/ruby2.5
- merge-disco-2.5.3-3ubuntu1
- Merge into debian/sid
Status: | Merged |
---|---|
Approved by: | Christian Ehrhardt |
Approved revision: | a97fbb451720ec444c2dfb40662cbad115d6617e |
Merge reported by: | Christian Ehrhardt |
Merged at revision: | a97fbb451720ec444c2dfb40662cbad115d6617e |
Proposed branch: | ~paelzer/ubuntu/+source/ruby2.5:merge-disco-2.5.3-3ubuntu1 |
Merge into: | ubuntu/+source/ruby2.5:debian/sid |
Diff against target: |
394 lines (+328/-1) 7 files modified
debian/changelog (+81/-0) debian/control (+2/-1) debian/patches/0001-openssl-buffering.rb-no-RS-when-output.patch (+42/-0) debian/patches/0006-Workaround-for-old-LibreSSL.patch (+27/-0) debian/patches/1dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch (+157/-0) debian/patches/rubygems-2388.patch (+15/-0) debian/patches/series (+4/-0) |
Related bugs: |
Reviewer | Review Type | Date Requested | Status |
---|---|---|---|
Dimitri John Ledkov (community) | Approve | ||
Matthias Klose | Pending | ||
Canonical Server | Pending | ||
Canonical Server packageset reviewers | Pending | ||
git-ubuntu developers | Pending | ||
Review via email:
|
Commit message
Description of the change

Christian Ehrhardt (paelzer) wrote : | # |

Christian Ehrhardt (paelzer) wrote : | # |
Note: there was a bunch of old Delta that was formerly undocumented, but I split it out in the deconstruct&logical tags.
When rebasing some of them (of course not all or none) were already upstream - so I modified them accordingly to drop them post merge. That way it was much more transparent what was removed (and why).

Christian Ehrhardt (paelzer) wrote : | # |
Test results: https:/
Still many running, will look into test failures (puma seems broken) tomorrow.

Christian Ehrhardt (paelzer) wrote : | # |
Test issues with:
- puma (all)
Has a bad test history, but also is only in -proposed.
Needs trigger with proposed enabled, then retries and if it continues to fail like in the past
it will need a force-badtest if three is no new regression)
- ruby-hamlit (all)
covered ubuntu-
- ruby-prof (amd64)
"rake failed to run ..."
Has a history of failing that way in 2/10 recent tests, rerun the test to be good
- ruby-rjb (x86)
But here broke on "W: Unable to locate package ruby-rjb"
=> exists only in proposed, needs trigger with proposed enabled and then retries for the 50%
flaky test
TL;DR: Tests look mostly good and those which failed seem handle-able.
@xnox - thanks for the review!

Christian Ehrhardt (paelzer) wrote : | # |
Tag pushed so the next one doing a merge can use the split history.
Uploaded to disco and awaiting the expected test fallout in -proposed.
Uploading to ubuntu (via ftp to upload.ubuntu.com):
Uploading ruby2.5_
Uploading ruby2.5_
Uploading ruby2.5_
Uploading ruby2.5_
Uploading ruby2.5_
Successfully uploaded packages.
Preview Diff
1 | diff --git a/debian/changelog b/debian/changelog |
2 | index 7b20f12..cab2b90 100644 |
3 | --- a/debian/changelog |
4 | +++ b/debian/changelog |
5 | @@ -1,3 +1,29 @@ |
6 | +ruby2.5 (2.5.3-3ubuntu1) disco; urgency=medium |
7 | + |
8 | + * Merge with Debian unstable (LP: #1806694). Remaining changes: |
9 | + - d/p/1dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch: Cherrypick |
10 | + upstream commit to fix session resumption with TLS 1.3. |
11 | + - d/p/rubygems-2388.patch: Allow either Fetcher or OpenSSL exceptions |
12 | + when using invalid cert in rubygems testcase. |
13 | + - various backports for better openssl support (formerly undocumented in |
14 | + changelog) |
15 | + + d/p/0001-openssl-buffering.rb-no-RS-when-output.patch |
16 | + + d/p/0006-Workaround-for-old-LibreSSL.patch |
17 | + * Dropped changes |
18 | + - various backports for better openssl support (formerly undocumented in |
19 | + changelog, but upstream now) |
20 | + + d/p/0002-no-ID-cache-in-Init-functions.patch |
21 | + + d/p/0003-search-winsock-libraries-explicitly.patch |
22 | + + d/p/0004-openssl-search-winsock.patch |
23 | + + d/p/0007-openssl_missing.h-constified.patch |
24 | + + d/p/0008-reduce-LibreSSL-warnings.patch |
25 | + + d/p/0009-openssl-sync-with-upstream-repository.patch |
26 | + - SECURITY UPDATE: Name equality check CVE-2018-16395 (in upstream) |
27 | + - SECURITY UPDATE: Tainted flags not propagted CVE-2018-16396 (in upstream) |
28 | + - 0012-test-time-tzdata-2018f.patch: Adjust tz tests for new tzdata. |
29 | + |
30 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 04 Dec 2018 15:40:55 +0100 |
31 | + |
32 | ruby2.5 (2.5.3-3) unstable; urgency=medium |
33 | |
34 | * arm64: also skip TestBugReporter#test_bug_reporter_add, which also fails~ |
35 | @@ -44,6 +70,35 @@ ruby2.5 (2.5.3-1) unstable; urgency=medium |
36 | |
37 | -- Antonio Terceiro <terceiro@debian.org> Sat, 24 Nov 2018 12:38:59 -0200 |
38 | |
39 | +ruby2.5 (2.5.1-6ubuntu3) disco; urgency=medium |
40 | + |
41 | + * SECURITY UPDATE: Name equality check |
42 | + - debian/patches/CVE-2018-16395.patch: fix in |
43 | + ext/openssl/ossl_x509name.c. |
44 | + - CVE-2018-16395 |
45 | + * SECURITY UPDATE: Tainted flags not propagted |
46 | + - debian/patches/CVE-2018-16396.patch: fix in |
47 | + pack.c, test/ruby/test_pack.rb. |
48 | + - CVE-2018-16396 |
49 | + |
50 | + -- Leonidas S. Barbosa <leo.barbosa@canonical.com> Tue, 20 Nov 2018 10:30:19 -0300 |
51 | + |
52 | +ruby2.5 (2.5.1-6ubuntu2) disco; urgency=medium |
53 | + |
54 | + * 0012-test-time-tzdata-2018f.patch: Adjust tz tests for new tzdata. |
55 | + |
56 | + -- Adam Conrad <adconrad@ubuntu.com> Sun, 04 Nov 2018 15:38:57 -0700 |
57 | + |
58 | +ruby2.5 (2.5.1-6ubuntu1) disco; urgency=medium |
59 | + |
60 | + * Merge with Debian; remaining changes: |
61 | + - Allow either Fetcher or OpenSSL exceptions when using invalid cert in |
62 | + rubygems testcase. |
63 | + - Cherrypick upstream commit to fix session resumption with TLS 1.3. |
64 | + - Cherrypick upstream commit to bump the test key size for OpenSSL 1.1.1. |
65 | + |
66 | + -- Matthias Klose <doko@ubuntu.com> Sun, 04 Nov 2018 09:39:53 +0100 |
67 | + |
68 | ruby2.5 (2.5.1-6) unstable; urgency=medium |
69 | |
70 | * Fix build with openssl 1.1.1 (Closes: #907790) |
71 | @@ -63,6 +118,32 @@ ruby2.5 (2.5.1-6) unstable; urgency=medium |
72 | |
73 | -- Antonio Terceiro <terceiro@debian.org> Sat, 06 Oct 2018 14:15:02 -0300 |
74 | |
75 | +ruby2.5 (2.5.1-5ubuntu4) cosmic; urgency=high |
76 | + |
77 | + * No change rebuild against openssl 1.1.1 with TLS1.3 support. |
78 | + |
79 | + -- Dimitri John Ledkov <xnox@ubuntu.com> Tue, 25 Sep 2018 11:36:36 +0100 |
80 | + |
81 | +ruby2.5 (2.5.1-5ubuntu3) cosmic; urgency=medium |
82 | + |
83 | + * Allow either Fetcher or OpenSSL exceptions when using invalid cert in |
84 | + rubygems testcase. |
85 | + |
86 | + -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 24 Sep 2018 12:10:21 +0100 |
87 | + |
88 | +ruby2.5 (2.5.1-5ubuntu2) cosmic; urgency=medium |
89 | + |
90 | + * Cherrypick upstream commits to sync ruby-openssl extension to 2.1.1. |
91 | + |
92 | + -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 24 Sep 2018 10:49:54 +0100 |
93 | + |
94 | +ruby2.5 (2.5.1-5ubuntu1) cosmic; urgency=medium |
95 | + |
96 | + * Cherrypick upstream commit to fix session resumption with TLS 1.3. |
97 | + * Cherrypick upstream commit to bump the test key size for OpenSSL 1.1.1. |
98 | + |
99 | + -- Dimitri John Ledkov <xnox@ubuntu.com> Sun, 23 Sep 2018 19:42:19 +0100 |
100 | + |
101 | ruby2.5 (2.5.1-5) unstable; urgency=medium |
102 | |
103 | * Fix spelling error in patch description |
104 | diff --git a/debian/control b/debian/control |
105 | index 9398c85..2d1e35a 100644 |
106 | --- a/debian/control |
107 | +++ b/debian/control |
108 | @@ -1,7 +1,8 @@ |
109 | Source: ruby2.5 |
110 | Section: ruby |
111 | Priority: optional |
112 | -Maintainer: Debian Ruby Team <pkg-ruby-extras-maintainers@lists.alioth.debian.org> |
113 | +Maintainer: Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
114 | +XSBC-Original-Maintainer: Debian Ruby Team <pkg-ruby-extras-maintainers@lists.alioth.debian.org> |
115 | Uploaders: Antonio Terceiro <terceiro@debian.org>, |
116 | Chris Hofstaedtler <zeha@debian.org> |
117 | Build-Depends: bison, |
118 | diff --git a/debian/patches/0001-openssl-buffering.rb-no-RS-when-output.patch b/debian/patches/0001-openssl-buffering.rb-no-RS-when-output.patch |
119 | new file mode 100644 |
120 | index 0000000..f7b0d8e |
121 | --- /dev/null |
122 | +++ b/debian/patches/0001-openssl-buffering.rb-no-RS-when-output.patch |
123 | @@ -0,0 +1,42 @@ |
124 | +From 07decad25f969908f7b2cc97208548605e35c5db Mon Sep 17 00:00:00 2001 |
125 | +From: nobu <nobu@b2dd03c8-39d4-4d8f-98ff-823fe69b080e> |
126 | +Date: Thu, 25 Jan 2018 11:21:47 +0000 |
127 | +Subject: [PATCH 1/9] openssl/buffering.rb: no RS when output |
128 | + |
129 | +* ext/openssl/lib/openssl/buffering.rb (do_write, puts): output |
130 | + methods should not be affected by the input record separator. |
131 | + |
132 | +git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@62038 b2dd03c8-39d4-4d8f-98ff-823fe69b080e |
133 | +--- |
134 | + ext/openssl/lib/openssl/buffering.rb | 8 +++----- |
135 | + 1 file changed, 3 insertions(+), 5 deletions(-) |
136 | + |
137 | +diff --git a/ext/openssl/lib/openssl/buffering.rb b/ext/openssl/lib/openssl/buffering.rb |
138 | +index 935f61f0ef..1f2b2a7e44 100644 |
139 | +--- a/ext/openssl/lib/openssl/buffering.rb |
140 | ++++ b/ext/openssl/lib/openssl/buffering.rb |
141 | +@@ -316,8 +316,8 @@ def do_write(s) |
142 | + @wbuffer << s |
143 | + @wbuffer.force_encoding(Encoding::BINARY) |
144 | + @sync ||= false |
145 | +- if @sync or @wbuffer.size > BLOCK_SIZE or idx = @wbuffer.rindex($/) |
146 | +- remain = idx ? idx + $/.size : @wbuffer.length |
147 | ++ if @sync or @wbuffer.size > BLOCK_SIZE or idx = @wbuffer.rindex("\n") |
148 | ++ remain = idx ? idx + 1 : @wbuffer.size |
149 | + nwritten = 0 |
150 | + while remain > 0 |
151 | + str = @wbuffer[nwritten,remain] |
152 | +@@ -409,9 +409,7 @@ def puts(*args) |
153 | + end |
154 | + args.each{|arg| |
155 | + s << arg.to_s |
156 | +- if $/ && /\n\z/ !~ s |
157 | +- s << "\n" |
158 | +- end |
159 | ++ s.sub!(/(?<!\n)\z/, "\n") |
160 | + } |
161 | + do_write(s) |
162 | + nil |
163 | +-- |
164 | +2.17.1 |
165 | + |
166 | diff --git a/debian/patches/0006-Workaround-for-old-LibreSSL.patch b/debian/patches/0006-Workaround-for-old-LibreSSL.patch |
167 | new file mode 100644 |
168 | index 0000000..c160ebb |
169 | --- /dev/null |
170 | +++ b/debian/patches/0006-Workaround-for-old-LibreSSL.patch |
171 | @@ -0,0 +1,27 @@ |
172 | +From 162adb82d1fc1abb3ca0ba86d450709b3bd7e321 Mon Sep 17 00:00:00 2001 |
173 | +From: nobu <nobu@b2dd03c8-39d4-4d8f-98ff-823fe69b080e> |
174 | +Date: Wed, 30 May 2018 09:13:21 +0000 |
175 | +Subject: [PATCH 6/9] Workaround for old LibreSSL |
176 | + |
177 | +git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@63526 b2dd03c8-39d4-4d8f-98ff-823fe69b080e |
178 | +--- |
179 | + ext/openssl/openssl_missing.h | 3 +++ |
180 | + 1 file changed, 3 insertions(+) |
181 | + |
182 | +diff --git a/ext/openssl/openssl_missing.h b/ext/openssl/openssl_missing.h |
183 | +index debd25adea..da3248a7c8 100644 |
184 | +--- a/ext/openssl/openssl_missing.h |
185 | ++++ b/ext/openssl/openssl_missing.h |
186 | +@@ -27,6 +27,9 @@ int ossl_EC_curve_nist2nid(const char *); |
187 | + |
188 | + #if !defined(HAVE_X509_STORE_CTX_GET0_STORE) |
189 | + # define X509_STORE_CTX_get0_store(x) ((x)->ctx) |
190 | ++#elif defined(LIBRESSL_VERSION_NUMBER) && LIBRESSL_VERSION_NUMBER < 0x2070000fL |
191 | ++/* old LibreSSL provides this function but lacks the declaration */ |
192 | ++X509_STORE *X509_STORE_CTX_get0_store(X509_STORE_CTX *xs); |
193 | + #endif |
194 | + |
195 | + #if !defined(HAVE_SSL_IS_SERVER) |
196 | +-- |
197 | +2.17.1 |
198 | + |
199 | diff --git a/debian/patches/1dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch b/debian/patches/1dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch |
200 | new file mode 100644 |
201 | index 0000000..707dbd7 |
202 | --- /dev/null |
203 | +++ b/debian/patches/1dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch |
204 | @@ -0,0 +1,157 @@ |
205 | +From 1dfc377ae3b174b043d3f0ed36de57b0296b34d0 Mon Sep 17 00:00:00 2001 |
206 | +From: rhe <rhe@b2dd03c8-39d4-4d8f-98ff-823fe69b080e> |
207 | +Date: Wed, 8 Aug 2018 14:13:55 +0000 |
208 | +Subject: [PATCH] net/http, net/ftp: fix session resumption with TLS 1.3 |
209 | + |
210 | +When TLS 1.3 is in use, the session ticket may not have been sent yet |
211 | +even though a handshake has finished. Also, the ticket could change if |
212 | +multiple session ticket messages are sent by the server. Use |
213 | +SSLContext#session_new_cb instead of calling SSLSocket#session |
214 | +immediately after a handshake. This way also works with earlier protocol |
215 | +versions. |
216 | + |
217 | +git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@64234 b2dd03c8-39d4-4d8f-98ff-823fe69b080e |
218 | +--- |
219 | + lib/net/ftp.rb | 5 ++++- |
220 | + lib/net/http.rb | 7 +++++-- |
221 | + test/net/http/test_https.rb | 35 ++++++++++------------------------- |
222 | + 3 files changed, 19 insertions(+), 28 deletions(-) |
223 | + |
224 | +diff --git a/lib/net/ftp.rb b/lib/net/ftp.rb |
225 | +index c3ee47ef4d36..9902f9dc657a 100644 |
226 | +--- a/lib/net/ftp.rb |
227 | ++++ b/lib/net/ftp.rb |
228 | +@@ -230,6 +230,10 @@ def initialize(host = nil, user_or_options = {}, passwd = nil, acct = nil) |
229 | + if defined?(VerifyCallbackProc) |
230 | + @ssl_context.verify_callback = VerifyCallbackProc |
231 | + end |
232 | ++ @ssl_context.session_cache_mode = |
233 | ++ OpenSSL::SSL::SSLContext::SESSION_CACHE_CLIENT | |
234 | ++ OpenSSL::SSL::SSLContext::SESSION_CACHE_NO_INTERNAL_STORE |
235 | ++ @ssl_context.session_new_cb = proc {|sock, sess| @ssl_session = sess } |
236 | + @ssl_session = nil |
237 | + if options[:private_data_connection].nil? |
238 | + @private_data_connection = true |
239 | +@@ -349,7 +353,6 @@ def start_tls_session(sock) |
240 | + if @ssl_context.verify_mode != VERIFY_NONE |
241 | + ssl_sock.post_connection_check(@host) |
242 | + end |
243 | +- @ssl_session = ssl_sock.session |
244 | + return ssl_sock |
245 | + end |
246 | + private :start_tls_session |
247 | +diff --git a/lib/net/http.rb b/lib/net/http.rb |
248 | +index 281b15cedff0..683a884f5dbe 100644 |
249 | +--- a/lib/net/http.rb |
250 | ++++ b/lib/net/http.rb |
251 | +@@ -983,6 +983,10 @@ def connect |
252 | + end |
253 | + @ssl_context = OpenSSL::SSL::SSLContext.new |
254 | + @ssl_context.set_params(ssl_parameters) |
255 | ++ @ssl_context.session_cache_mode = |
256 | ++ OpenSSL::SSL::SSLContext::SESSION_CACHE_CLIENT | |
257 | ++ OpenSSL::SSL::SSLContext::SESSION_CACHE_NO_INTERNAL_STORE |
258 | ++ @ssl_context.session_new_cb = proc {|sock, sess| @ssl_session = sess } |
259 | + D "starting SSL for #{conn_address}:#{conn_port}..." |
260 | + s = OpenSSL::SSL::SSLSocket.new(s, @ssl_context) |
261 | + s.sync_close = true |
262 | +@@ -990,13 +994,12 @@ def connect |
263 | + s.hostname = @address if s.respond_to? :hostname= |
264 | + if @ssl_session and |
265 | + Process.clock_gettime(Process::CLOCK_REALTIME) < @ssl_session.time.to_f + @ssl_session.timeout |
266 | +- s.session = @ssl_session if @ssl_session |
267 | ++ s.session = @ssl_session |
268 | + end |
269 | + ssl_socket_connect(s, @open_timeout) |
270 | + if @ssl_context.verify_mode != OpenSSL::SSL::VERIFY_NONE |
271 | + s.post_connection_check(@address) |
272 | + end |
273 | +- @ssl_session = s.session |
274 | + D "SSL established" |
275 | + end |
276 | + @socket = BufferedIO.new(s, read_timeout: @read_timeout, |
277 | +diff --git a/test/net/http/test_https.rb b/test/net/http/test_https.rb |
278 | +index 8004d5c5f29f..a5182a1fe9db 100644 |
279 | +--- a/test/net/http/test_https.rb |
280 | ++++ b/test/net/http/test_https.rb |
281 | +@@ -71,20 +71,11 @@ def test_session_reuse |
282 | + http.get("/") |
283 | + http.finish |
284 | + |
285 | +- http.start |
286 | +- http.get("/") |
287 | +- http.finish # three times due to possible bug in OpenSSL 0.9.8 |
288 | +- |
289 | +- sid = http.instance_variable_get(:@ssl_session).id |
290 | +- |
291 | + http.start |
292 | + http.get("/") |
293 | + |
294 | + socket = http.instance_variable_get(:@socket).io |
295 | +- |
296 | +- assert socket.session_reused? |
297 | +- |
298 | +- assert_equal sid, http.instance_variable_get(:@ssl_session).id |
299 | ++ assert_equal true, socket.session_reused? |
300 | + |
301 | + http.finish |
302 | + rescue SystemCallError |
303 | +@@ -101,16 +92,12 @@ def test_session_reuse_but_expire |
304 | + http.get("/") |
305 | + http.finish |
306 | + |
307 | +- sid = http.instance_variable_get(:@ssl_session).id |
308 | +- |
309 | + http.start |
310 | + http.get("/") |
311 | + |
312 | + socket = http.instance_variable_get(:@socket).io |
313 | + assert_equal false, socket.session_reused? |
314 | + |
315 | +- assert_not_equal sid, http.instance_variable_get(:@ssl_session).id |
316 | +- |
317 | + http.finish |
318 | + rescue SystemCallError |
319 | + skip $! |
320 | +@@ -160,15 +147,16 @@ def test_certificate_verify_failure |
321 | + end |
322 | + |
323 | + def test_identity_verify_failure |
324 | ++ # the certificate's subject has CN=localhost |
325 | + http = Net::HTTP.new("127.0.0.1", config("port")) |
326 | + http.use_ssl = true |
327 | +- http.verify_callback = Proc.new do |preverify_ok, store_ctx| |
328 | +- true |
329 | +- end |
330 | ++ http.cert_store = TEST_STORE |
331 | ++ @log_tester = lambda {|_| } |
332 | + ex = assert_raise(OpenSSL::SSL::SSLError){ |
333 | + http.request_get("/") {|res| } |
334 | + } |
335 | +- assert_match(/hostname \"127.0.0.1\" does not match/, ex.message) |
336 | ++ re_msg = /certificate verify failed|hostname \"127.0.0.1\" does not match/ |
337 | ++ assert_match(re_msg, ex.message) |
338 | + end |
339 | + |
340 | + def test_timeout_during_SSL_handshake |
341 | +@@ -193,16 +181,13 @@ def test_timeout_during_SSL_handshake |
342 | + end |
343 | + |
344 | + def test_min_version |
345 | +- http = Net::HTTP.new("127.0.0.1", config("port")) |
346 | ++ http = Net::HTTP.new("localhost", config("port")) |
347 | + http.use_ssl = true |
348 | + http.min_version = :TLS1 |
349 | +- http.verify_callback = Proc.new do |preverify_ok, store_ctx| |
350 | +- true |
351 | +- end |
352 | +- ex = assert_raise(OpenSSL::SSL::SSLError){ |
353 | +- http.request_get("/") {|res| } |
354 | ++ http.cert_store = TEST_STORE |
355 | ++ http.request_get("/") {|res| |
356 | ++ assert_equal($test_net_http_data, res.body) |
357 | + } |
358 | +- assert_match(/hostname \"127.0.0.1\" does not match/, ex.message) |
359 | + end |
360 | + |
361 | + def test_max_version |
362 | diff --git a/debian/patches/rubygems-2388.patch b/debian/patches/rubygems-2388.patch |
363 | new file mode 100644 |
364 | index 0000000..26bf929 |
365 | --- /dev/null |
366 | +++ b/debian/patches/rubygems-2388.patch |
367 | @@ -0,0 +1,15 @@ |
368 | +Description: Allow either Fetcher or OpenSSL exceptions when using invalid cert in rubygems testcase. |
369 | +Author: Dimitri John Ledkov <xnox@ubuntu.com> |
370 | +Bug-Upstream: https://github.com/rubygems/rubygems/issues/2388 |
371 | + |
372 | +--- ruby2.5-2.5.1.orig/test/rubygems/test_gem_remote_fetcher.rb |
373 | ++++ ruby2.5-2.5.1/test/rubygems/test_gem_remote_fetcher.rb |
374 | +@@ -842,7 +842,7 @@ PeIQQkFng2VVot/WAQbv3ePqWq07g1BBcwIBAg== |
375 | + with_configured_fetcher( |
376 | + ":ssl_ca_cert: #{temp_ca_cert}\n" + |
377 | + ":ssl_client_cert: #{temp_client_cert}\n") do |fetcher| |
378 | +- assert_raises Gem::RemoteFetcher::FetchError do |
379 | ++ assert_raises Gem::RemoteFetcher::FetchError, OpenSSL::SSL::SSLError do |
380 | + fetcher.fetch_path("https://localhost:#{ssl_server.config[:Port]}/yaml") |
381 | + end |
382 | + end |
383 | diff --git a/debian/patches/series b/debian/patches/series |
384 | index 7ca7914..7ef25fc 100644 |
385 | --- a/debian/patches/series |
386 | +++ b/debian/patches/series |
387 | @@ -9,3 +9,7 @@ |
388 | 0009-test-test_pair-fix-deadlock-in-test_connect_accept_n.patch |
389 | 0010-test-use-larger-keys-for-SSL-tests.patch |
390 | 0011-Update-for-tzdata-2018f.patch |
391 | +1dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch |
392 | +0001-openssl-buffering.rb-no-RS-when-output.patch |
393 | +0006-Workaround-for-old-LibreSSL.patch |
394 | +rubygems-2388.patch |
Extra tags to ease review: deconstruct/ 2.5.1-6ubuntu3 -> lp1806694/ deconstruct/ 2.5.1-6ubuntu3 logical/ 2.5.1-6ubuntu3 -> lp1806694/ logical/ 2.5.1-6ubuntu3 new/debian -> lp1806694/ new/debian old/debian -> lp1806694/ old/debian old/ubuntu -> lp1806694/ old/ubuntu reconstruct/ 2.5.1-6ubuntu3 -> lp1806694/ reconstruct/ 2.5.1-6ubuntu3
* [new tag] lp1806694/
* [new tag] lp1806694/
* [new tag] lp1806694/
* [new tag] lp1806694/
* [new tag] lp1806694/
* [new tag] lp1806694/
Test builds in PPA https:/ /launchpad. net/~ci- train-ppa- service/ +archive/ ubuntu/ 3552
Tests to be scheduled from Bileto once build is completed