Package: src:ruby-json-jwt; Maintainer for src:ruby-json-jwt is Debian Ruby Team <pkg-ruby-extras-maintainers@lists.alioth.debian.org>;
Reported by: Lucas Nussbaum <lucas@debian.org>
Date: Thu, 26 May 2022 06:51:26 UTC
Severity: serious
Tags: bookworm, ftbfs, sid
Found in version ruby-json-jwt/1.13.0-1
Fixed in version ruby-json-jwt/1.14.0-2
Done: Utkarsh Gupta <utkarsh@debian.org>
Bug is archived. No further changes may be made.
View this report as an mbox folder, status mbox, maintainer mbox
Report forwarded
to debian-bugs-dist@lists.debian.org, Debian Ruby Team <pkg-ruby-extras-maintainers@lists.alioth.debian.org>:
Bug#1011682; Package src:ruby-json-jwt.
(Thu, 26 May 2022 06:51:28 GMT) (full text, mbox, link).
Acknowledgement sent
to Lucas Nussbaum <lucas@debian.org>:
New Bug report received and forwarded. Copy sent to Debian Ruby Team <pkg-ruby-extras-maintainers@lists.alioth.debian.org>.
(Thu, 26 May 2022 06:51:28 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: ruby-json-jwt Version: 1.13.0-1 Severity: serious Justification: FTBFS Tags: bookworm sid ftbfs User: lucas@debian.org Usertags: ftbfs-20220525 ftbfs-bookworm Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part (hopefully): > Failure/Error: key.set_key n, e, d > > OpenSSL::PKey::PKeyError: > rsa#set_key= is incompatible with OpenSSL 3.0 > # ./lib/json/jwk.rb:106:in `set_key' > # ./lib/json/jwk.rb:106:in `to_rsa_key' > # ./lib/json/jwk.rb:43:in `to_key' > # ./lib/json/jose.rb:27:in `with_jwk_support' > # ./lib/json/jws.rb:100:in `sign' > # ./lib/json/jws.rb:17:in `sign!' > # ./lib/json/jwt.rb:35:in `sign' > # ./spec/json/jwt_spec.rb:130:in `block (4 levels) in <top (required)>' > > Finished in 0.7193 seconds (files took 0.45001 seconds to load) > 380 examples, 117 failures, 6 pending > > Failed examples: > > rspec ./spec/interop/with_jsrsasign_spec.rb:41 # interop with jsrsasign JWS verify should succeed > rspec ./spec/json/jwk_spec.rb:105 # JSON::JWK when RSA public key given #to_key > rspec ./spec/json/jwk_spec.rb:139 # JSON::JWK when EC public key given unknown curve > rspec ./spec/json/jwk_spec.rb:160 # JSON::JWK when EC public key given #to_key > rspec ./spec/json/jwk_spec.rb:187 # JSON::JWK unknown key type > rspec './spec/json/jws_spec.rb[1:4:4:2:1:1]' # JSON::JWS#sign! RS256 when JSON::JWK key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:4:2:1:2:1]' # JSON::JWS#sign! RS256 when JSON::JWK key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:4:2:2:1]' # JSON::JWS#sign! RS256 when JSON::JWK key given behaves like generate_expected_signature > rspec './spec/json/jws_spec.rb[1:4:4:2:2:2:1]' # JSON::JWS#sign! RS256 when JSON::JWK key given behaves like generate_expected_signature with blank payload > rspec './spec/json/jws_spec.rb[1:4:5:2:1:1]' # JSON::JWS#sign! RS384 when JSON::JWK key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:5:2:1:2:1]' # JSON::JWS#sign! RS384 when JSON::JWK key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:5:2:2:1]' # JSON::JWS#sign! RS384 when JSON::JWK key given behaves like generate_expected_signature > rspec './spec/json/jws_spec.rb[1:4:5:2:2:2:1]' # JSON::JWS#sign! RS384 when JSON::JWK key given behaves like generate_expected_signature with blank payload > rspec './spec/json/jws_spec.rb[1:4:6:2:1:1]' # JSON::JWS#sign! RS512 when JSON::JWK key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:6:2:1:2:1]' # JSON::JWS#sign! RS512 when JSON::JWK key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:6:2:2:1]' # JSON::JWS#sign! RS512 when JSON::JWK key given behaves like generate_expected_signature > rspec './spec/json/jws_spec.rb[1:4:6:2:2:2:1]' # JSON::JWS#sign! RS512 when JSON::JWK key given behaves like generate_expected_signature with blank payload > rspec './spec/json/jws_spec.rb[1:4:7:1:1:1]' # JSON::JWS#sign! ES256 when OpenSSL::PKey::EC key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:7:1:1:2:1]' # JSON::JWS#sign! ES256 when OpenSSL::PKey::EC key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:7:1:2:1]' # JSON::JWS#sign! ES256 when OpenSSL::PKey::EC key given behaves like self_verifiable should be self-verifiable > rspec './spec/json/jws_spec.rb[1:4:7:2:1:1]' # JSON::JWS#sign! ES256 when JSON::JWK key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:7:2:1:2:1]' # JSON::JWS#sign! ES256 when JSON::JWK key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:7:2:2:1]' # JSON::JWS#sign! ES256 when JSON::JWK key given behaves like self_verifiable should be self-verifiable > rspec './spec/json/jws_spec.rb[1:4:8:1:1:1]' # JSON::JWS#sign! ES384 when OpenSSL::PKey::EC key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:8:1:1:2:1]' # JSON::JWS#sign! ES384 when OpenSSL::PKey::EC key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:8:1:2:1]' # JSON::JWS#sign! ES384 when OpenSSL::PKey::EC key given behaves like self_verifiable should be self-verifiable > rspec './spec/json/jws_spec.rb[1:4:8:2:1:1]' # JSON::JWS#sign! ES384 when JSON::JWK key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:8:2:1:2:1]' # JSON::JWS#sign! ES384 when JSON::JWK key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:8:2:2:1]' # JSON::JWS#sign! ES384 when JSON::JWK key given behaves like self_verifiable should be self-verifiable > rspec './spec/json/jws_spec.rb[1:4:9:1:1:1]' # JSON::JWS#sign! ES512 when OpenSSL::PKey::EC key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:9:1:1:2:1]' # JSON::JWS#sign! ES512 when OpenSSL::PKey::EC key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:9:1:2:1]' # JSON::JWS#sign! ES512 when OpenSSL::PKey::EC key given behaves like self_verifiable should be self-verifiable > rspec './spec/json/jws_spec.rb[1:4:9:2:1:1]' # JSON::JWS#sign! ES512 when JSON::JWK key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:9:2:1:2:1]' # JSON::JWS#sign! ES512 when JSON::JWK key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:9:2:2:1]' # JSON::JWS#sign! ES512 when JSON::JWK key given behaves like self_verifiable should be self-verifiable > rspec './spec/json/jws_spec.rb[1:4:10:1:1:1]' # JSON::JWS#sign! ES256K when OpenSSL::PKey::EC key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:10:1:1:2:1]' # JSON::JWS#sign! ES256K when OpenSSL::PKey::EC key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:10:1:2:1]' # JSON::JWS#sign! ES256K when OpenSSL::PKey::EC key given behaves like self_verifiable should be self-verifiable > rspec './spec/json/jws_spec.rb[1:4:10:2:1:1]' # JSON::JWS#sign! ES256K when JSON::JWK key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:10:2:1:2:1]' # JSON::JWS#sign! ES256K when JSON::JWK key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:10:2:2:1]' # JSON::JWS#sign! ES256K when JSON::JWK key given behaves like self_verifiable should be self-verifiable > rspec './spec/json/jws_spec.rb[1:5:4:2:1:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:4:2:1:2:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:4:2:1:3:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:2:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:3:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:5:2:1:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:5:2:1:2:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:5:2:1:3:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:2:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:3:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:6:2:1:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:6:2:1:2:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:6:2:1:3:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:2:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:3:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:7:1:1:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:7:1:1:2:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:7:1:1:3:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:2:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:3:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:7:2:1:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:7:2:1:2:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:7:2:1:3:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:2:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:3:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:8:1:1:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:8:1:1:2:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:8:1:1:3:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:2:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:3:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:8:2:1:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:8:2:1:2:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:8:2:1:3:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:2:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:3:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:9:1:1:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:9:1:1:2:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:9:1:1:3:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:2:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:3:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:9:2:1:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:9:2:1:2:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:9:2:1:3:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:2:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:3:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:10:1:1:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:10:1:1:2:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:10:1:1:3:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:2:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:3:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:10:2:1:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:10:2:1:2:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:10:2:1:3:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:2:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:3:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully > rspec ./spec/json/jwt_spec.rb:67 # JSON::JWT#sign when no algirithm specified when key is EC key when prime256v1 alg > rspec ./spec/json/jwt_spec.rb:72 # JSON::JWT#sign when no algirithm specified when key is EC key when secp384r1 alg > rspec ./spec/json/jwt_spec.rb:77 # JSON::JWT#sign when no algirithm specified when key is EC key when secp521r1 alg > rspec ./spec/json/jwt_spec.rb:82 # JSON::JWT#sign when no algirithm specified when key is EC key when secp256k1 alg > rspec ./spec/json/jwt_spec.rb:93 # JSON::JWT#sign when no algirithm specified when key is JWK with kty=RSA alg > rspec ./spec/json/jwt_spec.rb:99 # JSON::JWT#sign when no algirithm specified when key is JWK with kty=EC when prime256v1 alg > rspec ./spec/json/jwt_spec.rb:104 # JSON::JWT#sign when no algirithm specified when key is JWK with kty=EC when secp384r1 alg > rspec ./spec/json/jwt_spec.rb:109 # JSON::JWT#sign when no algirithm specified when key is JWK with kty=EC when secp521r1 alg > rspec ./spec/json/jwt_spec.rb:114 # JSON::JWT#sign when no algirithm specified when key is JWK with kty=EC when secp256k1 alg > rspec ./spec/json/jwt_spec.rb:129 # JSON::JWT#sign when JWK is given should set kid header automatically > > /usr/bin/ruby3.0 -I/usr/share/rubygems-integration/all/gems/rspec-support-3.10.3/lib:/usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/lib /usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/exe/rspec --pattern ./spec/\*\*/\*_spec.rb --format documentation failed > ERROR: Test "ruby3.0" failed: The full build log is available from: http://qa-logs.debian.net/2022/05/25/ruby-json-jwt_1.13.0-1_unstable.log All bugs filed during this archive rebuild are listed at: https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20220525;users=lucas@debian.org or: https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20220525&fusertaguser=lucas@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! If you reassign this bug to another package, please marking it as 'affects'-ing this package. See https://www.debian.org/Bugs/server-control#affects If you fail to reproduce this, please provide a build log and diff it with mine so that we can identify if something relevant changed in the meantime.
Reply sent
to Utkarsh Gupta <utkarsh@debian.org>:
You have taken responsibility.
(Sat, 17 Sep 2022 11:39:03 GMT) (full text, mbox, link).
Notification sent
to Lucas Nussbaum <lucas@debian.org>:
Bug acknowledged by developer.
(Sat, 17 Sep 2022 11:39:03 GMT) (full text, mbox, link).
Message #10 received at 1011682-close@bugs.debian.org (full text, mbox, reply):
Source: ruby-json-jwt Source-Version: 1.14.0-2 Done: Utkarsh Gupta <utkarsh@debian.org> We believe that the bug you reported is fixed in the latest version of ruby-json-jwt, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1011682@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Utkarsh Gupta <utkarsh@debian.org> (supplier of updated ruby-json-jwt package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sat, 17 Sep 2022 16:44:10 +0530 Source: ruby-json-jwt Architecture: source Version: 1.14.0-2 Distribution: unstable Urgency: medium Maintainer: Debian Ruby Team <pkg-ruby-extras-maintainers@lists.alioth.debian.org> Changed-By: Utkarsh Gupta <utkarsh@debian.org> Closes: 1011682 Changes: ruby-json-jwt (1.14.0-2) unstable; urgency=medium . * No-change rebuild for unstable. (Closes: #1011682) * Add myself as an uploader Checksums-Sha1: 9f1929148fa0723d028c8c7adf9d9f9f4fcd45f5 2190 ruby-json-jwt_1.14.0-2.dsc 4cc490b72cb80a858b245d73038fe0ffdedf2701 26028 ruby-json-jwt_1.14.0.orig.tar.gz d0937dcb312d03c02b1f9b24c4b60fe4f12d8798 3168 ruby-json-jwt_1.14.0-2.debian.tar.xz 94c32fb8bec05bf50947039bd0dc0726f5c0ad45 14465 ruby-json-jwt_1.14.0-2_source.buildinfo Checksums-Sha256: 2e07bfc0c45c7ef7688716724828a6dd1bd1e4e82aea6b7b07c24dc6591c9802 2190 ruby-json-jwt_1.14.0-2.dsc a376944ef04e16f2d6ded9c5b52a602e4496c5524af7f2a1afa30e522bb74b60 26028 ruby-json-jwt_1.14.0.orig.tar.gz 228b35f503efd3db84648dee8fe27da0d10524bcc7ec630712b63fdaf9fd2cb0 3168 ruby-json-jwt_1.14.0-2.debian.tar.xz 7918e9f2c519fdeb0684a6fafa6811ca3ccd641e35ae987b56d90f3c6247dab7 14465 ruby-json-jwt_1.14.0-2_source.buildinfo Files: 406331a2391dab49fc2aa305a1252b1e 2190 ruby optional ruby-json-jwt_1.14.0-2.dsc 3b4c8cc602f2890f5e9953fdd22303c1 26028 ruby optional ruby-json-jwt_1.14.0.orig.tar.gz 3a7dd1838416a7984af9ef4850bc4507 3168 ruby optional ruby-json-jwt_1.14.0-2.debian.tar.xz cc94710cc6c32a5a6dcd05a2381c5f87 14465 ruby optional ruby-json-jwt_1.14.0-2_source.buildinfo -----BEGIN PGP SIGNATURE----- iQJHBAEBCAAxFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAmMlrDUTHHV0a2Fyc2hA ZGViaWFuLm9yZwAKCRCCPpZ2BsNLlg3KEADb/YkuDJMmduAcd4lZY2ObXgi3WRDe PKYclVy/bvgxr3Ol2o7U3JT3OX86U/zaXFhAEKNlgvTMu82PmHRh+7MnymPkMUy7 XmeataUk5O3K5d9w3V/dvkDGrcF279I1jZzAR9XRSVVFNWpe9+jqAe5l0U2fy/wX O4z3W13gaLcMXCd9PtdnMtlcXPu9V7uIU9l20Qus8rdv/cDpxeWF7ANwteg4Gxse JFqiaUZowzbQ8jTtz4dI27W+BuZrXJ9AWIlMAoi1/0/GcsA3nSZFwfqyWSXZKYHX RJUWnN2XurqRXcPCqjKXqvywP5LTu4UgIDenpE/NtOjQ3YkOjZi7jsGtKX1whTBR WcPcj15ttbDFu5g7ziLauESXeZHdWwP2uBaRnq+8naTWJ8aFr9v0uW9lU0PvBN7P RUEJGWm720lL1JQDtShK298ofxBnmuHwPwWKzQDsDsqaKQtDpkRuQ6zAGlPfEkse H1xbX8paQe8LOBhFEN9VJsBw8F6C2P/1g4FhkBMX9+BHXLupaXO//19zcDveGjIE OwQ/mGxfDiPr7oCZQbG0TBONR29ZF79owxbmyScs46nVJKvr6hcjD7Sf+anvLIcO WMu3HRwt5LMFboupsaqFp7wZdp/3cPQwJhgDl+SbYNrGMLLRzulWiDJB6C1PkJvk gt/ZJMhUnqajfw== =0O4V -----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Mon, 17 Oct 2022 07:29:24 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.