Bug#934356: stretch-pu: package mitmproxy/0.18.2-6
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian.org@packages.debian.org
Usertags: pu
Could 0.18.2-6+deb9u1 be included in stretch's next point release ? It
closes #934033, which is an FTBFS on stretch, by blacklisting a couple
#more things from the test suite.
Here's the corresponding debdiff:
diff --git a/debian/changelog b/debian/changelog
index 53e5f5e0..4fcb7218 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,10 @@
+mitmproxy (0.18.2-6+deb9u1) stretch; urgency=medium
+
+ * Blacklist tests that require internet access (Closes: #934033)
+ * Add d/gbp.conf
+
+ -- Sebastien Delafond <seb@debian.org> Thu, 08 Aug 2019 10:59:45 +0200
+
mitmproxy (0.18.2-6) unstable; urgency=medium
* Remove upper-bounds on all versioned dependencies (Closes: #848562)
diff --git a/debian/gbp.conf b/debian/gbp.conf
new file mode 100644
index 00000000..cf311b7f
--- /dev/null
+++ b/debian/gbp.conf
@@ -0,0 +1,3 @@
+[DEFAULT]
+debian-branch = debian/stretch
+upstream-branch = upstream/latest
diff --git a/debian/rules b/debian/rules
index 52e363b9..ef374ed1 100755
--- a/debian/rules
+++ b/debian/rules
@@ -1,7 +1,7 @@
#!/usr/bin/make -f
export PYBUILD_NAME=mitmproxy
-export PYBUILD_TEST_ARGS="-k-TestServerIPv6 -k-TestServerCurrentCipher -k-TestServerCipherList"
+export PYBUILD_TEST_ARGS="-k-TestServerIPv6 -k-TestServerCurrentCipher -k-TestServerCipherList -k-TestSSLUpstreamCertVerificationWValidCertChain -k-TestHTTPSUpstreamServerVerificationWTrustedCert"
MAN_PAGES := $(shell cat debian/mitmproxy.manpages)
Cheers,
--
Seb
-- System Information:
Debian Release: buster/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'oldstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 4.19.0-3-amd64 (SMP w/36 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_DIE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Reply to: