The attached info file updates the nodejs package to the 0.10.38 release and uses the current debian patch set. The failures in the InfoTest for...
=== release test-child-process-customfd-bounded ===
Path: simple/test-child-process-customfd-bounded
child_process.js:935
throw errnoException(process._errno, 'spawn');
are eliminated by using an explicit shell for the InfoTest and setting "ulimit -n 4096". The changes from the current info file are...
~~~~~~
Index: nodejs.info
===================================================================
RCS file: /cvsroot/fink/dists/10.7/stable/main/finkinfo/web/nodejs.info,v
retrieving revision 1.4
diff -r1.4 nodejs.info
2,3c2,3
< Version: 0.10.26
< Revision: 1.1
Version: 0.10.38
Revision: 1
5a6
fink (>= 0.32),
22,24c23,25
< Source-MD5: 15e9018dadc63a2046f61eb13dfd7bd6
< Source2: mirror:debian:pool/main/n/%n/%n_%v~dfsg1-1.debian.tar.gz
< Source2-MD5: 567c20416ff552b43f48cf0e7cc5d497
Source-MD5: 3f45f994f1f02736576bf7bff1870897
Source2: mirror:debian:pool/main/n/%n/%n_%v~dfsg-1.debian.tar.xz
Source2-MD5: e24ca253edc3851bbeafa331a60fec4a
28a30
SetCFLAGS: -Os
52c54
< patch -p1 < debian/patches/2011_mipsel.patch
patch -p1 < debian/patches/2011_mips_mipsel.patch
60a63,66
patch -p1 < debian/patches/1006_relax_timeouts_in_tests.patch
patch -p1 < debian/patches/1007_revert_invalid_utf8_fix.patch
patch -p1 < debian/patches/1008_revert_abort_uncaught_1.patch
patch -p1 < debian/patches/1008_revert_abort_uncaught_2.patch
111a118,119!/bin/sh -ev
ulimit -n 4096
~~~~~
Tested with 'fink -m' on 10.10.
Info file for nodejs-0.10.38-1
This one is tough for me as I have one in my exp but requires my PR for newer dpkg. So I have no way of testing it easily without breaking my system which I use everyday. Can anyone else test this for me?
I'd like to keep a clean update path to my current version in my exp if possible as I'm still hopeful for my PR someday ;)
I have a new version of nodejs finally in my exp, updating it to 4.6 which now builds it's own static libv8 and c-ares. Both of which were problems for me on this port in the past, I just need to get it tested on 10.9 or 10 or 11 so I can commit it since I only have 10.12 ATM.
It's in my exp dir if you are interested.
I did not get any test failures when I built it with -m on 10.12
self-test problems on 10.11.....
This one's maybe because I ran it unattended, and didn't click to accept an incoming network connection?...
This one's maybe because I ran it unattended, and didn't click to accept an incoming network connection, so it couldn't set up a server to run the test?...
~~~=== release test-tls-honorcipherorder ===
Path: simple/test-tls-honorcipherorder
assert.js:92
throw new assert.AssertionError({
^
AssertionError: "RC4-SHA" == "DES-CBC-SHA"
at CleartextStream.<anonymous> (/sw/build.build/nodejs-0.10.26-1.1/node-v0.10.26/test/simple/test-tls-honorcipherorder.js:60:14)
at CleartextStream.g (events.js:180:16)
at CleartextStream.EventEmitter.emit (events.js:92:17)
at SecurePair.<anonymous> (tls.js:1392:19)
at SecurePair.EventEmitter.emit (events.js:92:17)
at SecurePair.maybeInitFinished (tls.js:982:10)
at CleartextStream.read [as _read] (tls.js:469:13)
at CleartextStream.Readable.read (_stream_readable.js:320:10)
at EncryptedStream.write [as _write] (tls.js:366:25)
at doWrite (_stream_writable.js:226:10)
Command: out/Release/node /sw/build.build/nodejs-0.10.26-1.1/node-v0.10.26/test/simple/test-tls-honorcipherorder.js
=== release test-tls-securepair-client ===
Path: simple/test-tls-securepair-client
Using default temp DH parameters
ACCEPT
client connected
client: connected+secure!
client pair.cleartext.getPeerCertificate(): {"subject":{"C":"AU","ST":"Some-State","O":"Internet Widgits Pty Ltd"},"issuer":{"C":"AU","ST":"Some-State","O":"Internet Widgits Pty Ltd"},"modulus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exponent":"10001","valid_from":"Nov 16 09:32:49 2010 GMT","valid_to":"Nov 15 09:32:49 2013 GMT","fingerprint":"FF:91:92:D1:18:5D:21:9B:E2:7D:C7:9E:63:F2:51:73:A9:61:77:CA"}
client pair.cleartext.getCipher(): {"name":"AES128-SHA","version":"TLSv1/SSLv3"}
-----BEGIN SSL SESSION PARAMETERS-----
MGICAQECAgMDBAIALwQABDDJ5mPp9F5BfMSDidpZwxSqM7yfiozMzpVBqHEwJCWs
EnG1EcxOwEVmsR6nPtV2tq2hBgIEWAd4t6IEAgIcIKQGBAQBAAAApgsECXVuZGVm
aW5lZA==
-----END SSL SESSION PARAMETERS-----
Shared ciphers:AES128-SHA:AES256-SHA
Signature Algorithms: RSA+SHA512:DSA+SHA512:ECDSA+SHA512:RSA+SHA384:DSA+SHA384:ECDSA+SHA384:RSA+SHA256:DSA+SHA256:ECDSA+SHA256:RSA+SHA224:DSA+SHA224:ECDSA+SHA224:RSA+SHA1:DSA+SHA1:ECDSA+SHA1
Shared Signature Algorithms: RSA+SHA512:DSA+SHA512:ECDSA+SHA512:RSA+SHA384:DSA+SHA384:ECDSA+SHA384:RSA+SHA256:DSA+SHA256:ECDSA+SHA256:RSA+SHA224:DSA+SHA224:ECDSA+SHA224:RSA+SHA1:DSA+SHA1:ECDSA+SHA1
CIPHER is AES128-SHA
Secure Renegotiation IS supported
hello
DONE
shutdown accept socket
client close
shutting down SSL
CONNECTION CLOSED
0 items in the session cache
0 client connects (SSL_connect())
0 client renegotiates (SSL_connect())
0 client connects that finished
1 server accepts (SSL_accept())
0 server renegotiates (SSL_accept())
1 server accepts that finished
0 session cache hits
0 session cache misses
0 session cache timeouts
0 callback cache hits
0 cache full overflows (128 allowed)
Using default temp DH parameters
error setting certificate
140735207489536:error:0906D06C:PEM routines:PEM_read_bio:no start line:crypto/pem/pem_lib.c:691:Expecting: DH PARAMETERS
140735207489536:error:140AB18F:SSL routines:SSL_CTX_use_certificate:ee key too small:ssl/ssl_rsa.c:305:
WAIT-ACCEPT
WAIT-ACCEPT
WAIT-HELLO
WAIT-HELLO
WAIT-SERVER-CLOSE
WAIT-SERVER-CLOSE
WAIT-ACCEPT
assert.js:92
throw new assert.AssertionError({
^
AssertionError: 0 == 1
at process.<anonymous> (/sw/build.build/nodejs-0.10.26-1.1/node-v0.10.26/test/simple/test-tls-securepair-client.js:197:12)
at process.EventEmitter.emit (events.js:117:20)
Command: out/Release/node /sw/build.build/nodejs-0.10.26-1.1/node-v0.10.26/test/simple/test-tls-securepair-client.js
Ignore me there...was the current in fink, not the new one being submitted.
10.11, TestScript warns:
~~~
export HOME = /sw/build.build/nodejs-4.6.0-2.1/node-v4.6.0/test/tmp
/tmp/fink.PPfIG: line 3: export:
=': not a valid identifier /tmp/fink.PPfIG: line 3: export:
/sw/build.build/nodejs-4.6.0-2.1/node-v4.6.0/test/tmp': not a valid identifierexecution of /tmp/fink.PPfIG failed, exit code 1
execution of /tmp/fink.LJ30G failed, exit code 1
phase test: warning
~~~
Shell hates whitespace around "=" in variable assignments.
new version in my exp now runs the tests and on 10.12 only produces 4 tls errors out of 1040 tests, so pretty good though I'm still trying to figure out why the 4 failures. Could you retest on 10.11 see if it's the same out come please?
I get those four on 10.11, but also one more:
I believe most of these tls tests fail based on the IPv6 issue from https://github.com/nodejs/build/issues/415
I'm setting them all to FLAKY for now, the zlib one you got though I'm unsure of as I do get it, I'm setting it to flaky for now too, if I get reports I'll dig deeper.
okay commited in my exp if someone wants to test it on 10.11,10 or 9
tested on 10.12 same failures but none fatal now. And a few other build system cleanups. Also updated to 4.6.1
Commited 4.6.1