Skip Menu |

This queue is for tickets about the Net-Prober CPAN distribution.

Report information
The Basics
Id: 109092
Status: resolved
Priority: 0/
Queue: Net-Prober

People
Owner: Nobody in particular
Requestors: SREZIC [...] cpan.org
Cc:
AdminCc:

Bug Information
Severity: (no value)
Broken in: 0.14
Fixed in: (no value)



Subject: t/http.t fails (with Net::DNS 1.03?)
t/http.t fails, probably only if Net::DNS 1.03 is installed: # Failed test 'Page downloaded and MD5 verified' # at t/http.t line 30. # Failed test 'Got the correct 'md5' value' # at t/http.t line 36. # Response HTTP status code didn't match the specified regex ('^[23]\d\d$') # Failed test at t/http.t line 49. # Response HTTP status code didn't match the specified regex ('^[23]\d\d$') # Looks like you failed 3 tests of 7. t/http.t ........ Dubious, test returned 3 (wstat 768, 0x300) Failed 3/7 subtests
Il Mar 17 Nov 2015 15:22:41, SREZIC ha scritto: Show quoted text
> t/http.t fails, probably only if Net::DNS 1.03 is installed: > > # Failed test 'Page downloaded and MD5 verified' > # at t/http.t line 30. > > # Failed test 'Got the correct 'md5' value' > # at t/http.t line 36. > # Response HTTP status code didn't match the specified regex ('^[23]\d\d$') > > # Failed test at t/http.t line 49. > # Response HTTP status code didn't match the specified regex ('^[23]\d\d$') > # Looks like you failed 3 tests of 7. > t/http.t ........ > Dubious, test returned 3 (wstat 768, 0x300) > Failed 3/7 subtests
Thanks for the report. Do you have any insights as to why the test would fail only with Net::DNS 1.03? Does that version of Net::DNS have any particular bug/feature that you know of?
On 2015-11-17 15:34:50, COSIMO wrote: Show quoted text
> Il Mar 17 Nov 2015 15:22:41, SREZIC ha scritto:
> > t/http.t fails, probably only if Net::DNS 1.03 is installed: > > > > # Failed test 'Page downloaded and MD5 verified' > > # at t/http.t line 30. > > > > # Failed test 'Got the correct 'md5' value' > > # at t/http.t line 36. > > # Response HTTP status code didn't match the specified regex > > ('^[23]\d\d$') > > > > # Failed test at t/http.t line 49. > > # Response HTTP status code didn't match the specified regex > > ('^[23]\d\d$') > > # Looks like you failed 3 tests of 7. > > t/http.t ........ > > Dubious, test returned 3 (wstat 768, 0x300) > > Failed 3/7 subtests
> > Thanks for the report. > > Do you have any insights as to why the test would fail only with > Net::DNS 1.03? > Does that version of Net::DNS have any particular bug/feature that you > know of?
One notable item in the changes file is the switch to use IO::Socket::IP. There's also a number of other CPAN modules which break with the newest Net::DNS: - KARASIK/IO-Lambda-1.24.tar.gz - https://rt.cpan.org/Ticket/Display.html?id=108911 -> fixed in 1.25 - TOKUHIROM/Net-DNS-Paranoid-0.08.tar.gz - https://github.com/tokuhirom/Net-DNS-Paranoid/issues/2 - SULLR/Mail-SPF-Iterator-1.11.tar.gz - https://rt.cpan.org/Ticket/Display.html?id=108914 - SHEVEK/Net-DNS-Async-1.07.tar.gz - https://rt.cpan.org/Ticket/Display.html?id=108915 - KYANNY/WebService-Livedoor-SpamChampuru-DNSBL-0.02.tar.gz - https://rt.cpan.org/Ticket/Display.html?id=108916 - KMCGRAIL/SpamAssassin/Mail-SpamAssassin-3.4.1.tar.gz - https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7265 - BINGOS/POE-Component-Server-DNS-0.30.tar.gz - https://rt.cpan.org/Ticket/Display.html?id=108936
Il Mar 17 Nov 2015 15:37:49, SREZIC ha scritto: Show quoted text
> One notable item in the changes file is the switch to use > IO::Socket::IP. There's also a number of other CPAN modules which > break with the newest Net::DNS: > - KARASIK/IO-Lambda-1.24.tar.gz - > https://rt.cpan.org/Ticket/Display.html?id=108911 -> fixed in 1.25 > - TOKUHIROM/Net-DNS-Paranoid-0.08.tar.gz - > https://github.com/tokuhirom/Net-DNS-Paranoid/issues/2 > - SULLR/Mail-SPF-Iterator-1.11.tar.gz - > https://rt.cpan.org/Ticket/Display.html?id=108914 > - SHEVEK/Net-DNS-Async-1.07.tar.gz - > https://rt.cpan.org/Ticket/Display.html?id=108915 > - KYANNY/WebService-Livedoor-SpamChampuru-DNSBL-0.02.tar.gz - > https://rt.cpan.org/Ticket/Display.html?id=108916 > - KMCGRAIL/SpamAssassin/Mail-SpamAssassin-3.4.1.tar.gz - > https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7265 > - BINGOS/POE-Component-Server-DNS-0.30.tar.gz - > https://rt.cpan.org/Ticket/Display.html?id=108936
Update. Tonight I got my CPAN testers email with all the failures, even though Net::Prober code hasn't been touched: ------- Net-Prober-0.14: - amd64-freebsd / 5.10.1: - FAIL http://www.cpantesters.org/cpan/report/dcdf4d70-8d6b-11e5-a239-85c4dfbfc7aa - amd64-freebsd / 5.14.4: - FAIL http://www.cpantesters.org/cpan/report/8945d59e-8d6b-11e5-8b4d-70c3dfbfc7aa - amd64-freebsd / 5.18.2: - FAIL http://www.cpantesters.org/cpan/report/5b3526d8-8d6a-11e5-8226-1dbfdfbfc7aa - amd64-freebsd / 5.18.4: - FAIL http://www.cpantesters.org/cpan/report/1627812c-8d73-11e5-b76b-55dfdfbfc7aa - amd64-freebsd / 5.20.0: - FAIL http://www.cpantesters.org/cpan/report/d53bd09a-8d69-11e5-b854-09bddfbfc7aa - amd64-freebsd / 5.20.2: - FAIL http://www.cpantesters.org/cpan/report/2e6747fc-8d70-11e5-b3b8-0ed4dfbfc7aa - amd64-freebsd-thread-multi / 5.16.3: - FAIL http://www.cpantesters.org/cpan/report/885dedd8-8d6b-11e5-8b4d-70c3dfbfc7aa - x86_64-linux / 5.10.1: - FAIL http://www.cpantesters.org/cpan/report/5cdc414c-8d6a-11e5-8226-1dbfdfbfc7aa - x86_64-linux / 5.12.5: - FAIL http://www.cpantesters.org/cpan/report/5c06a0aa-8d6a-11e5-8226-1dbfdfbfc7aa - x86_64-linux / 5.14.4: - FAIL http://www.cpantesters.org/cpan/report/dce0a578-8d69-11e5-b854-09bddfbfc7aa - x86_64-linux / 5.16.3: - FAIL http://www.cpantesters.org/cpan/report/dbdd144a-8d69-11e5-b854-09bddfbfc7aa - x86_64-linux / 5.18.2: - FAIL http://www.cpantesters.org/cpan/report/dae45d3c-8d69-11e5-b854-09bddfbfc7aa - x86_64-linux / 5.18.4: - FAIL http://www.cpantesters.org/cpan/report/d9b57ef0-8d69-11e5-b854-09bddfbfc7aa - x86_64-linux / 5.20.0: - FAIL http://www.cpantesters.org/cpan/report/5d22c622-8d69-11e5-ab29-18badfbfc7aa - x86_64-linux / 5.20.1: - FAIL http://www.cpantesters.org/cpan/report/5c38e674-8d69-11e5-ab29-18badfbfc7aa - x86_64-linux / 5.20.2: - FAIL http://www.cpantesters.org/cpan/report/5b5552e2-8d69-11e5-ab29-18badfbfc7aa - x86_64-linux / 5.20.3: - FAIL http://www.cpantesters.org/cpan/report/4058ce14-8d65-11e5-b6d6-73addfbfc7aa - x86_64-linux / 5.22.0: - FAIL http://www.cpantesters.org/cpan/report/5a7feb3e-8d69-11e5-ab29-18badfbfc7aa - x86_64-linux / 5.23.4: - FAIL http://www.cpantesters.org/cpan/report/ee051a00-8d64-11e5-984c-49abdfbfc7aa - x86_64-linux-ld / 5.20.1: - FAIL http://www.cpantesters.org/cpan/report/5885b6e2-8d69-11e5-ab29-18badfbfc7aa - x86_64-linux-thread-multi / 5.18.2: - FAIL http://www.cpantesters.org/cpan/report/d871adca-8d69-11e5-b854-09bddfbfc7aa - x86_64-linux-thread-multi / 5.18.4: - FAIL http://www.cpantesters.org/cpan/report/d73deb44-8d69-11e5-b854-09bddfbfc7aa - x86_64-linux-thread-multi / 5.20.0: - FAIL http://www.cpantesters.org/cpan/report/d61df434-8d69-11e5-b854-09bddfbfc7aa - x86_64-linux-thread-multi / 5.22.0: - FAIL http://www.cpantesters.org/cpan/report/2f7e16c6-8d65-11e5-bf35-1baddfbfc7aa ------ I'll see if I can find out more about this, but in the meantime it seems this ticket covers the Net::DNS issue: https://rt.cpan.org/Ticket/Display.html?id=108745 -- Cosimo
Looked at Net::Prober code, and I think the failure comes from use of LWPx::ParanoidAgent, itself broken by Net::DNS, as it directly makes use of bgsend()/bgread(). Here's a changeset from POE::Component::Client::DNS which gets to the problem: https://metacpan.org/diff/file?target=RCAPUTO%2FPOE-Component-Client-DNS-1.054%2F&source=RCAPUTO%2FPOE-Component-Client-DNS-1.053%2F
Il Mer 18 Nov 2015 03:38:11, COSIMO ha scritto: Show quoted text
> Looked at Net::Prober code, and I think the failure comes from use of > LWPx::ParanoidAgent, itself broken by Net::DNS, as it directly makes > use of bgsend()/bgread(). > > Here's a changeset from POE::Component::Client::DNS which gets to the > problem: > > https://metacpan.org/diff/file?target=RCAPUTO%2FPOE-Component-Client- > DNS-1.054%2F&source=RCAPUTO%2FPOE-Component-Client-DNS-1.053%2F
Pull request for LWPx::ParanoidAgent filed: https://github.com/csirtgadgets/LWPx-ParanoidAgent/pull/16 Let's see who comes first, if Net::DNS reverts back the change or LWPx::ParanoidAgent maintainer :-)
On Wed 18 Nov 2015 04:22:33, COSIMO wrote: Show quoted text
> Let's see who comes first, if Net::DNS reverts back the change or > LWPx::ParanoidAgent maintainer :-)
The upcoming 1.04 release of Net::DNS (coming Tuesday 8th of December) will no longer break LWPx::ParanoidAgent without your fix. The fix looks safe for 1.04 too b.t.w.
Seems that the Net::DNS update resolved the problem.