Skip Menu |

This queue is for tickets about the Net-DNS-SEC CPAN distribution.

Report information
The Basics
Id: 82031
Status: resolved
Priority: 0/
Queue: Net-DNS-SEC

People
Owner: Nobody in particular
Requestors: ANDK [...] cpan.org
Cc:
AdminCc:

Bug Information
Severity: Important
Broken in: 0.16
Fixed in: (no value)



Subject: Test failures due to hash randomisation in perl 5.17.6
Since bleadperl v5.17.5-518-g7dc8663 your tests are failing under some circumstances. That commit introduced hash key randomization and it seems at least the test t/15-ds.t is hit by that. Find a sample fail report at: http://www.cpantesters.org/cpan/report/f01076c0-435a-11e2-a2e2-5e2fa8c9b5a1 You can read more about the change at http://perl5.git.perl.org/perl.git/commit/7dc8663964c66a698d31bbdc8e8abed69bddeec3 or at http://www.perlmonks.org/?node_id=1005122 You may have to run the test several times until the randomization causes a fail. Note: my smokers have produced FAILs of the 15-ds.t test only when Net::DNS 0.70 or 0.71 was installed, smokers with 0.68 were stable in the PASS area. So I tried downgrading to Net::DNS 0.68 and indeed, the results became reliable PASSes again. HTH&&Thanks&&Regards,
From: ppisar [...] redhat.com
Dne Ne 16.pro.2012 12:52:05, ANDK napsal(a): Show quoted text
> Since bleadperl v5.17.5-518-g7dc8663 your tests are failing under some > circumstances. > That commit introduced hash key randomization and it seems at least > the test > > t/15-ds.t > > is hit by that. Find a sample fail report at: > > http://www.cpantesters.org/cpan/report/f01076c0-435a-11e2-a2e2- > 5e2fa8c9b5a1 > > You can read more about the change at > http://perl5.git.perl.org/perl.git/commit/7dc8663964c66a698d31bbdc8e8abed69bddeec3 > or at http://www.perlmonks.org/?node_id=1005122 > > You may have to run the test several times until the randomization > causes a fail. > > Note: my smokers have produced FAILs of the 15-ds.t test only when > Net::DNS 0.70 or 0.71 was installed, smokers with 0.68 were stable in > the PASS area. So I tried downgrading to Net::DNS 0.68 and indeed, the > results became reliable PASSes again. >
I think this is not only about random hashes. The test fails even if I export PERL_PERTURB_KEYS=0. The error is: # got: 'test1dom1.se. 43200 IN DS 123 3 5 ; xexax' # expected: 'test1dom1.se. 43200 IN DS 123 3 5 1234567890ABCDEF ; xegif-guhil-megip-refev-zixax' This not just a different ordering, here you have completely new words. Moreover the stringification is done in Net::DNS::RR (I have 0.72).
Luckily the issue was triggered by uncarefull usage in the unit test. The unit-test is adapted to prevent these failures.