Debian Bug report logs - #1011682
ruby-json-jwt: FTBFS: ERROR: Test "ruby3.0" failed: Failure/Error: key.set_key n, e, d

version graph

Package: src:ruby-json-jwt; Maintainer for src:ruby-json-jwt is Debian Ruby Team <pkg-ruby-extras-maintainers@lists.alioth.debian.org>;

Reported by: Lucas Nussbaum <lucas@debian.org>

Date: Thu, 26 May 2022 06:51:26 UTC

Severity: serious

Tags: bookworm, ftbfs, sid

Found in version ruby-json-jwt/1.13.0-1

Fixed in version ruby-json-jwt/1.14.0-2

Done: Utkarsh Gupta <utkarsh@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Ruby Team <pkg-ruby-extras-maintainers@lists.alioth.debian.org>:
Bug#1011682; Package src:ruby-json-jwt. (Thu, 26 May 2022 06:51:28 GMT) (full text, mbox, link).


Acknowledgement sent to Lucas Nussbaum <lucas@debian.org>:
New Bug report received and forwarded. Copy sent to Debian Ruby Team <pkg-ruby-extras-maintainers@lists.alioth.debian.org>. (Thu, 26 May 2022 06:51:28 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Lucas Nussbaum <lucas@debian.org>
To: submit@bugs.debian.org
Subject: ruby-json-jwt: FTBFS: ERROR: Test "ruby3.0" failed: Failure/Error: key.set_key n, e, d
Date: Thu, 26 May 2022 08:09:09 +0200
Source: ruby-json-jwt
Version: 1.13.0-1
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: lucas@debian.org
Usertags: ftbfs-20220525 ftbfs-bookworm

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.


Relevant part (hopefully):
>        Failure/Error: key.set_key n, e, d
> 
>        OpenSSL::PKey::PKeyError:
>          rsa#set_key= is incompatible with OpenSSL 3.0
>        # ./lib/json/jwk.rb:106:in `set_key'
>        # ./lib/json/jwk.rb:106:in `to_rsa_key'
>        # ./lib/json/jwk.rb:43:in `to_key'
>        # ./lib/json/jose.rb:27:in `with_jwk_support'
>        # ./lib/json/jws.rb:100:in `sign'
>        # ./lib/json/jws.rb:17:in `sign!'
>        # ./lib/json/jwt.rb:35:in `sign'
>        # ./spec/json/jwt_spec.rb:130:in `block (4 levels) in <top (required)>'
> 
> Finished in 0.7193 seconds (files took 0.45001 seconds to load)
> 380 examples, 117 failures, 6 pending
> 
> Failed examples:
> 
> rspec ./spec/interop/with_jsrsasign_spec.rb:41 # interop with jsrsasign JWS verify should succeed
> rspec ./spec/json/jwk_spec.rb:105 # JSON::JWK when RSA public key given #to_key 
> rspec ./spec/json/jwk_spec.rb:139 # JSON::JWK when EC public key given unknown curve 
> rspec ./spec/json/jwk_spec.rb:160 # JSON::JWK when EC public key given #to_key 
> rspec ./spec/json/jwk_spec.rb:187 # JSON::JWK unknown key type 
> rspec './spec/json/jws_spec.rb[1:4:4:2:1:1]' # JSON::JWS#sign! RS256 when JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:4:2:1:2:1]' # JSON::JWS#sign! RS256 when JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:4:2:2:1]' # JSON::JWS#sign! RS256 when JSON::JWK key given behaves like generate_expected_signature 
> rspec './spec/json/jws_spec.rb[1:4:4:2:2:2:1]' # JSON::JWS#sign! RS256 when JSON::JWK key given behaves like generate_expected_signature with blank payload 
> rspec './spec/json/jws_spec.rb[1:4:5:2:1:1]' # JSON::JWS#sign! RS384 when JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:5:2:1:2:1]' # JSON::JWS#sign! RS384 when JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:5:2:2:1]' # JSON::JWS#sign! RS384 when JSON::JWK key given behaves like generate_expected_signature 
> rspec './spec/json/jws_spec.rb[1:4:5:2:2:2:1]' # JSON::JWS#sign! RS384 when JSON::JWK key given behaves like generate_expected_signature with blank payload 
> rspec './spec/json/jws_spec.rb[1:4:6:2:1:1]' # JSON::JWS#sign! RS512 when JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:6:2:1:2:1]' # JSON::JWS#sign! RS512 when JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:6:2:2:1]' # JSON::JWS#sign! RS512 when JSON::JWK key given behaves like generate_expected_signature 
> rspec './spec/json/jws_spec.rb[1:4:6:2:2:2:1]' # JSON::JWS#sign! RS512 when JSON::JWK key given behaves like generate_expected_signature with blank payload 
> rspec './spec/json/jws_spec.rb[1:4:7:1:1:1]' # JSON::JWS#sign! ES256 when OpenSSL::PKey::EC key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:7:1:1:2:1]' # JSON::JWS#sign! ES256 when OpenSSL::PKey::EC key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:7:1:2:1]' # JSON::JWS#sign! ES256 when OpenSSL::PKey::EC key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:7:2:1:1]' # JSON::JWS#sign! ES256 when JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:7:2:1:2:1]' # JSON::JWS#sign! ES256 when JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:7:2:2:1]' # JSON::JWS#sign! ES256 when JSON::JWK key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:8:1:1:1]' # JSON::JWS#sign! ES384 when OpenSSL::PKey::EC key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:8:1:1:2:1]' # JSON::JWS#sign! ES384 when OpenSSL::PKey::EC key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:8:1:2:1]' # JSON::JWS#sign! ES384 when OpenSSL::PKey::EC key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:8:2:1:1]' # JSON::JWS#sign! ES384 when JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:8:2:1:2:1]' # JSON::JWS#sign! ES384 when JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:8:2:2:1]' # JSON::JWS#sign! ES384 when JSON::JWK key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:9:1:1:1]' # JSON::JWS#sign! ES512 when OpenSSL::PKey::EC key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:9:1:1:2:1]' # JSON::JWS#sign! ES512 when OpenSSL::PKey::EC key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:9:1:2:1]' # JSON::JWS#sign! ES512 when OpenSSL::PKey::EC key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:9:2:1:1]' # JSON::JWS#sign! ES512 when JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:9:2:1:2:1]' # JSON::JWS#sign! ES512 when JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:9:2:2:1]' # JSON::JWS#sign! ES512 when JSON::JWK key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:10:1:1:1]' # JSON::JWS#sign! ES256K when OpenSSL::PKey::EC key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:10:1:1:2:1]' # JSON::JWS#sign! ES256K when OpenSSL::PKey::EC key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:10:1:2:1]' # JSON::JWS#sign! ES256K when OpenSSL::PKey::EC key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:10:2:1:1]' # JSON::JWS#sign! ES256K when JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:10:2:1:2:1]' # JSON::JWS#sign! ES256K when JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:10:2:2:1]' # JSON::JWS#sign! ES256K when JSON::JWK key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:2:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:3:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:2:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:3:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:2:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:3:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:2:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:3:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:2:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:3:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:2:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:3:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:2:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:3:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:2:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:3:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:2:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:3:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:2:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:3:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:2:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:3:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:2:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:3:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:2:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:3:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:2:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:3:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:2:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:3:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:2:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:3:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:2:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:3:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:2:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:3:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:2:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:3:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:2:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:3:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:2:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:3:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:2:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:3:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec ./spec/json/jwt_spec.rb:67 # JSON::JWT#sign when no algirithm specified when key is EC key when prime256v1 alg 
> rspec ./spec/json/jwt_spec.rb:72 # JSON::JWT#sign when no algirithm specified when key is EC key when secp384r1 alg 
> rspec ./spec/json/jwt_spec.rb:77 # JSON::JWT#sign when no algirithm specified when key is EC key when secp521r1 alg 
> rspec ./spec/json/jwt_spec.rb:82 # JSON::JWT#sign when no algirithm specified when key is EC key when secp256k1 alg 
> rspec ./spec/json/jwt_spec.rb:93 # JSON::JWT#sign when no algirithm specified when key is JWK with kty=RSA alg 
> rspec ./spec/json/jwt_spec.rb:99 # JSON::JWT#sign when no algirithm specified when key is JWK with kty=EC when prime256v1 alg 
> rspec ./spec/json/jwt_spec.rb:104 # JSON::JWT#sign when no algirithm specified when key is JWK with kty=EC when secp384r1 alg 
> rspec ./spec/json/jwt_spec.rb:109 # JSON::JWT#sign when no algirithm specified when key is JWK with kty=EC when secp521r1 alg 
> rspec ./spec/json/jwt_spec.rb:114 # JSON::JWT#sign when no algirithm specified when key is JWK with kty=EC when secp256k1 alg 
> rspec ./spec/json/jwt_spec.rb:129 # JSON::JWT#sign when JWK is given should set kid header automatically
> 
> /usr/bin/ruby3.0 -I/usr/share/rubygems-integration/all/gems/rspec-support-3.10.3/lib:/usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/lib /usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/exe/rspec --pattern ./spec/\*\*/\*_spec.rb --format documentation failed
> ERROR: Test "ruby3.0" failed: 


The full build log is available from:
http://qa-logs.debian.net/2022/05/25/ruby-json-jwt_1.13.0-1_unstable.log

All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20220525;users=lucas@debian.org
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20220525&fusertaguser=lucas@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

If you reassign this bug to another package, please marking it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.



Reply sent to Utkarsh Gupta <utkarsh@debian.org>:
You have taken responsibility. (Sat, 17 Sep 2022 11:39:03 GMT) (full text, mbox, link).


Notification sent to Lucas Nussbaum <lucas@debian.org>:
Bug acknowledged by developer. (Sat, 17 Sep 2022 11:39:03 GMT) (full text, mbox, link).


Message #10 received at 1011682-close@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 1011682-close@bugs.debian.org
Subject: Bug#1011682: fixed in ruby-json-jwt 1.14.0-2
Date: Sat, 17 Sep 2022 11:35:48 +0000
Source: ruby-json-jwt
Source-Version: 1.14.0-2
Done: Utkarsh Gupta <utkarsh@debian.org>

We believe that the bug you reported is fixed in the latest version of
ruby-json-jwt, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1011682@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Utkarsh Gupta <utkarsh@debian.org> (supplier of updated ruby-json-jwt package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 17 Sep 2022 16:44:10 +0530
Source: ruby-json-jwt
Architecture: source
Version: 1.14.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Team <pkg-ruby-extras-maintainers@lists.alioth.debian.org>
Changed-By: Utkarsh Gupta <utkarsh@debian.org>
Closes: 1011682
Changes:
 ruby-json-jwt (1.14.0-2) unstable; urgency=medium
 .
   * No-change rebuild for unstable. (Closes: #1011682)
   * Add myself as an uploader
Checksums-Sha1:
 9f1929148fa0723d028c8c7adf9d9f9f4fcd45f5 2190 ruby-json-jwt_1.14.0-2.dsc
 4cc490b72cb80a858b245d73038fe0ffdedf2701 26028 ruby-json-jwt_1.14.0.orig.tar.gz
 d0937dcb312d03c02b1f9b24c4b60fe4f12d8798 3168 ruby-json-jwt_1.14.0-2.debian.tar.xz
 94c32fb8bec05bf50947039bd0dc0726f5c0ad45 14465 ruby-json-jwt_1.14.0-2_source.buildinfo
Checksums-Sha256:
 2e07bfc0c45c7ef7688716724828a6dd1bd1e4e82aea6b7b07c24dc6591c9802 2190 ruby-json-jwt_1.14.0-2.dsc
 a376944ef04e16f2d6ded9c5b52a602e4496c5524af7f2a1afa30e522bb74b60 26028 ruby-json-jwt_1.14.0.orig.tar.gz
 228b35f503efd3db84648dee8fe27da0d10524bcc7ec630712b63fdaf9fd2cb0 3168 ruby-json-jwt_1.14.0-2.debian.tar.xz
 7918e9f2c519fdeb0684a6fafa6811ca3ccd641e35ae987b56d90f3c6247dab7 14465 ruby-json-jwt_1.14.0-2_source.buildinfo
Files:
 406331a2391dab49fc2aa305a1252b1e 2190 ruby optional ruby-json-jwt_1.14.0-2.dsc
 3b4c8cc602f2890f5e9953fdd22303c1 26028 ruby optional ruby-json-jwt_1.14.0.orig.tar.gz
 3a7dd1838416a7984af9ef4850bc4507 3168 ruby optional ruby-json-jwt_1.14.0-2.debian.tar.xz
 cc94710cc6c32a5a6dcd05a2381c5f87 14465 ruby optional ruby-json-jwt_1.14.0-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=0O4V
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Mon, 17 Oct 2022 07:29:24 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sun Oct 8 03:14:49 2023; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.