[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#904731: fakeupstream.cgi: fakeupstream.cgi?upstream=sf/* returns empty results



Package: qa.debian.org
Severity: normal

Dear Maintainer,

* What led up to the situation?

It seems that fakeupstream.cgi returns empty response if upstream=sf/* is specified.

* What exactly did you do (or not do) that was effective (or
  ineffective)?

I've noticed that accessing the following url by browser.

  https://qa.debian.org/cgi-bin/fakeupstream.cgi?upstream=sf/apertium/giella-sme

Also checked via curl:

LANG=C curl -v https://qa.debian.org/cgi-bin/fakeupstream.cgi?upstream=sf/apertium/giella-sme
*   Trying 2001:41c8:1000:21::21:28...
* TCP_NODELAY set
* connect to 2001:41c8:1000:21::21:28 port 443 failed: Connection refused
*   Trying 5.153.231.28...
* TCP_NODELAY set
* Connected to qa.debian.org (5.153.231.28) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
*   CAfile: /etc/ssl/certs/ca-certificates.crt
  CApath: /etc/ssl/certs
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
*  subject: CN=qa.debian.org
*  start date: Jun  8 00:32:46 2018 GMT
*  expire date: Sep  6 00:32:46 2018 GMT
*  subjectAltName: host "qa.debian.org" matched cert's "qa.debian.org"
*  issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
*  SSL certificate verify ok.
> GET /cgi-bin/fakeupstream.cgi?upstream=sf/apertium/giella-sme HTTP/1.1
> Host: qa.debian.org
> User-Agent: curl/7.60.0
> Accept: */*
> 
< HTTP/1.1 200 OK
< Date: Fri, 27 Jul 2018 09:17:12 GMT
< Server: Apache
< X-Content-Type-Options: nosniff
< X-Frame-Options: sameorigin
< Referrer-Policy: no-referrer
< X-Xss-Protection: 1
< Strict-Transport-Security: max-age=15552000
< Public-Key-Pins: pin-sha256="FucbwYIiPXFJ5+ftcgqknth2/JalZeR6eAg+6eGlmvE="; pin-sha256="I2RM2I85Fmn1oaLG2PAmqJSzUTCyJRaom+T+8wX+jqA="; max-age=5184000
< Vary: Accept-Encoding
< X-Clacks-Overhead: GNU Terry Pratchett
< Transfer-Encoding: chunked
< Content-Type: text/html; charset=ISO-8859-1
< 
<!DOCTYPE html
        PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
         "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd";>
<html xmlns="http://www.w3.org/1999/xhtml"; lang="en-US" xml:lang="en-US">
<head>
<title>Untitled Document</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
</head>
<body>
<ul></ul>
</body>
* Connection #0 to host qa.debian.org left intact
</html>

It returns empty list.

* What was the outcome of this action?

List of upstream versions

* What outcome did you expect instead?

No upstream versions

-- System Information:
Debian Release: buster/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.17.0-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=ja_JP.utf8, LC_CTYPE=ja_JP.utf8 (charmap=UTF-8), LANGUAGE=ja_JP.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Attachment: pgp9pO_5oizEd.pgp
Description: PGP signature


Reply to: