Source: ruby-json-jwt Version: 1.13.0-1 Severity: serious Justification: FTBFS Tags: bookworm sid ftbfs User: [email protected] Usertags: ftbfs-20220525 ftbfs-bookworm
Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part (hopefully): > Failure/Error: key.set_key n, e, d > > OpenSSL::PKey::PKeyError: > rsa#set_key= is incompatible with OpenSSL 3.0 > # ./lib/json/jwk.rb:106:in `set_key' > # ./lib/json/jwk.rb:106:in `to_rsa_key' > # ./lib/json/jwk.rb:43:in `to_key' > # ./lib/json/jose.rb:27:in `with_jwk_support' > # ./lib/json/jws.rb:100:in `sign' > # ./lib/json/jws.rb:17:in `sign!' > # ./lib/json/jwt.rb:35:in `sign' > # ./spec/json/jwt_spec.rb:130:in `block (4 levels) in <top (required)>' > > Finished in 0.7193 seconds (files took 0.45001 seconds to load) > 380 examples, 117 failures, 6 pending > > Failed examples: > > rspec ./spec/interop/with_jsrsasign_spec.rb:41 # interop with jsrsasign JWS > verify should succeed > rspec ./spec/json/jwk_spec.rb:105 # JSON::JWK when RSA public key given > #to_key > rspec ./spec/json/jwk_spec.rb:139 # JSON::JWK when EC public key given > unknown curve > rspec ./spec/json/jwk_spec.rb:160 # JSON::JWK when EC public key given > #to_key > rspec ./spec/json/jwk_spec.rb:187 # JSON::JWK unknown key type > rspec './spec/json/jws_spec.rb[1:4:4:2:1:1]' # JSON::JWS#sign! RS256 when > JSON::JWK key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:4:2:1:2:1]' # JSON::JWS#sign! RS256 when > JSON::JWK key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:4:2:2:1]' # JSON::JWS#sign! RS256 when > JSON::JWK key given behaves like generate_expected_signature > rspec './spec/json/jws_spec.rb[1:4:4:2:2:2:1]' # JSON::JWS#sign! RS256 when > JSON::JWK key given behaves like generate_expected_signature with blank > payload > rspec './spec/json/jws_spec.rb[1:4:5:2:1:1]' # JSON::JWS#sign! RS384 when > JSON::JWK key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:5:2:1:2:1]' # JSON::JWS#sign! RS384 when > JSON::JWK key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:5:2:2:1]' # JSON::JWS#sign! RS384 when > JSON::JWK key given behaves like generate_expected_signature > rspec './spec/json/jws_spec.rb[1:4:5:2:2:2:1]' # JSON::JWS#sign! RS384 when > JSON::JWK key given behaves like generate_expected_signature with blank > payload > rspec './spec/json/jws_spec.rb[1:4:6:2:1:1]' # JSON::JWS#sign! RS512 when > JSON::JWK key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:6:2:1:2:1]' # JSON::JWS#sign! RS512 when > JSON::JWK key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:6:2:2:1]' # JSON::JWS#sign! RS512 when > JSON::JWK key given behaves like generate_expected_signature > rspec './spec/json/jws_spec.rb[1:4:6:2:2:2:1]' # JSON::JWS#sign! RS512 when > JSON::JWK key given behaves like generate_expected_signature with blank > payload > rspec './spec/json/jws_spec.rb[1:4:7:1:1:1]' # JSON::JWS#sign! ES256 when > OpenSSL::PKey::EC key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:7:1:1:2:1]' # JSON::JWS#sign! ES256 when > OpenSSL::PKey::EC key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:7:1:2:1]' # JSON::JWS#sign! ES256 when > OpenSSL::PKey::EC key given behaves like self_verifiable should be > self-verifiable > rspec './spec/json/jws_spec.rb[1:4:7:2:1:1]' # JSON::JWS#sign! ES256 when > JSON::JWK key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:7:2:1:2:1]' # JSON::JWS#sign! ES256 when > JSON::JWK key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:7:2:2:1]' # JSON::JWS#sign! ES256 when > JSON::JWK key given behaves like self_verifiable should be self-verifiable > rspec './spec/json/jws_spec.rb[1:4:8:1:1:1]' # JSON::JWS#sign! ES384 when > OpenSSL::PKey::EC key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:8:1:1:2:1]' # JSON::JWS#sign! ES384 when > OpenSSL::PKey::EC key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:8:1:2:1]' # JSON::JWS#sign! ES384 when > OpenSSL::PKey::EC key given behaves like self_verifiable should be > self-verifiable > rspec './spec/json/jws_spec.rb[1:4:8:2:1:1]' # JSON::JWS#sign! ES384 when > JSON::JWK key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:8:2:1:2:1]' # JSON::JWS#sign! ES384 when > JSON::JWK key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:8:2:2:1]' # JSON::JWS#sign! ES384 when > JSON::JWK key given behaves like self_verifiable should be self-verifiable > rspec './spec/json/jws_spec.rb[1:4:9:1:1:1]' # JSON::JWS#sign! ES512 when > OpenSSL::PKey::EC key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:9:1:1:2:1]' # JSON::JWS#sign! ES512 when > OpenSSL::PKey::EC key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:9:1:2:1]' # JSON::JWS#sign! ES512 when > OpenSSL::PKey::EC key given behaves like self_verifiable should be > self-verifiable > rspec './spec/json/jws_spec.rb[1:4:9:2:1:1]' # JSON::JWS#sign! ES512 when > JSON::JWK key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:9:2:1:2:1]' # JSON::JWS#sign! ES512 when > JSON::JWK key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:9:2:2:1]' # JSON::JWS#sign! ES512 when > JSON::JWK key given behaves like self_verifiable should be self-verifiable > rspec './spec/json/jws_spec.rb[1:4:10:1:1:1]' # JSON::JWS#sign! ES256K when > OpenSSL::PKey::EC key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:10:1:1:2:1]' # JSON::JWS#sign! ES256K when > OpenSSL::PKey::EC key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:10:1:2:1]' # JSON::JWS#sign! ES256K when > OpenSSL::PKey::EC key given behaves like self_verifiable should be > self-verifiable > rspec './spec/json/jws_spec.rb[1:4:10:2:1:1]' # JSON::JWS#sign! ES256K when > JSON::JWK key given behaves like jwt_with_alg > rspec './spec/json/jws_spec.rb[1:4:10:2:1:2:1]' # JSON::JWS#sign! ES256K when > JSON::JWK key given behaves like jwt_with_alg header > rspec './spec/json/jws_spec.rb[1:4:10:2:2:1]' # JSON::JWS#sign! ES256K when > JSON::JWK key given behaves like self_verifiable should be self-verifiable > rspec './spec/json/jws_spec.rb[1:5:4:2:1:1]' # JSON::JWS#verify! RS256 when > JSON::JWK key given behaves like success_signature_verification is expected > not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:4:2:1:2:1]' # JSON::JWS#verify! RS256 when > JSON::JWK key given behaves like success_signature_verification header should > be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:4:2:1:3:1]' # JSON::JWS#verify! RS256 when > JSON::JWK key given behaves like success_signature_verification claims should > be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:1]' # JSON::JWS#verify! RS256 when > JSON::JWK key given behaves like success_signature_verification with blank > payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:2:1]' # JSON::JWS#verify! RS256 > when JSON::JWK key given behaves like success_signature_verification with > blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:3:1]' # JSON::JWS#verify! RS256 > when JSON::JWK key given behaves like success_signature_verification with > blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:5:2:1:1]' # JSON::JWS#verify! RS384 when > JSON::JWK key given behaves like success_signature_verification is expected > not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:5:2:1:2:1]' # JSON::JWS#verify! RS384 when > JSON::JWK key given behaves like success_signature_verification header should > be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:5:2:1:3:1]' # JSON::JWS#verify! RS384 when > JSON::JWK key given behaves like success_signature_verification claims should > be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:1]' # JSON::JWS#verify! RS384 when > JSON::JWK key given behaves like success_signature_verification with blank > payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:2:1]' # JSON::JWS#verify! RS384 > when JSON::JWK key given behaves like success_signature_verification with > blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:3:1]' # JSON::JWS#verify! RS384 > when JSON::JWK key given behaves like success_signature_verification with > blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:6:2:1:1]' # JSON::JWS#verify! RS512 when > JSON::JWK key given behaves like success_signature_verification is expected > not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:6:2:1:2:1]' # JSON::JWS#verify! RS512 when > JSON::JWK key given behaves like success_signature_verification header should > be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:6:2:1:3:1]' # JSON::JWS#verify! RS512 when > JSON::JWK key given behaves like success_signature_verification claims should > be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:1]' # JSON::JWS#verify! RS512 when > JSON::JWK key given behaves like success_signature_verification with blank > payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:2:1]' # JSON::JWS#verify! RS512 > when JSON::JWK key given behaves like success_signature_verification with > blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:3:1]' # JSON::JWS#verify! RS512 > when JSON::JWK key given behaves like success_signature_verification with > blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:7:1:1:1]' # JSON::JWS#verify! ES256 when > OpenSSL::PKey::EC key given behaves like success_signature_verification is > expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:7:1:1:2:1]' # JSON::JWS#verify! ES256 when > OpenSSL::PKey::EC key given behaves like success_signature_verification > header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:7:1:1:3:1]' # JSON::JWS#verify! ES256 when > OpenSSL::PKey::EC key given behaves like success_signature_verification > claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:1]' # JSON::JWS#verify! ES256 when > OpenSSL::PKey::EC key given behaves like success_signature_verification with > blank payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:2:1]' # JSON::JWS#verify! ES256 > when OpenSSL::PKey::EC key given behaves like success_signature_verification > with blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:3:1]' # JSON::JWS#verify! ES256 > when OpenSSL::PKey::EC key given behaves like success_signature_verification > with blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:7:2:1:1]' # JSON::JWS#verify! ES256 when > JSON::JWK key given behaves like success_signature_verification is expected > not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:7:2:1:2:1]' # JSON::JWS#verify! ES256 when > JSON::JWK key given behaves like success_signature_verification header should > be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:7:2:1:3:1]' # JSON::JWS#verify! ES256 when > JSON::JWK key given behaves like success_signature_verification claims should > be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:1]' # JSON::JWS#verify! ES256 when > JSON::JWK key given behaves like success_signature_verification with blank > payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:2:1]' # JSON::JWS#verify! ES256 > when JSON::JWK key given behaves like success_signature_verification with > blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:3:1]' # JSON::JWS#verify! ES256 > when JSON::JWK key given behaves like success_signature_verification with > blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:8:1:1:1]' # JSON::JWS#verify! ES384 when > OpenSSL::PKey::EC key given behaves like success_signature_verification is > expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:8:1:1:2:1]' # JSON::JWS#verify! ES384 when > OpenSSL::PKey::EC key given behaves like success_signature_verification > header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:8:1:1:3:1]' # JSON::JWS#verify! ES384 when > OpenSSL::PKey::EC key given behaves like success_signature_verification > claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:1]' # JSON::JWS#verify! ES384 when > OpenSSL::PKey::EC key given behaves like success_signature_verification with > blank payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:2:1]' # JSON::JWS#verify! ES384 > when OpenSSL::PKey::EC key given behaves like success_signature_verification > with blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:3:1]' # JSON::JWS#verify! ES384 > when OpenSSL::PKey::EC key given behaves like success_signature_verification > with blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:8:2:1:1]' # JSON::JWS#verify! ES384 when > JSON::JWK key given behaves like success_signature_verification is expected > not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:8:2:1:2:1]' # JSON::JWS#verify! ES384 when > JSON::JWK key given behaves like success_signature_verification header should > be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:8:2:1:3:1]' # JSON::JWS#verify! ES384 when > JSON::JWK key given behaves like success_signature_verification claims should > be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:1]' # JSON::JWS#verify! ES384 when > JSON::JWK key given behaves like success_signature_verification with blank > payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:2:1]' # JSON::JWS#verify! ES384 > when JSON::JWK key given behaves like success_signature_verification with > blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:3:1]' # JSON::JWS#verify! ES384 > when JSON::JWK key given behaves like success_signature_verification with > blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:9:1:1:1]' # JSON::JWS#verify! ES512 when > OpenSSL::PKey::EC key given behaves like success_signature_verification is > expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:9:1:1:2:1]' # JSON::JWS#verify! ES512 when > OpenSSL::PKey::EC key given behaves like success_signature_verification > header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:9:1:1:3:1]' # JSON::JWS#verify! ES512 when > OpenSSL::PKey::EC key given behaves like success_signature_verification > claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:1]' # JSON::JWS#verify! ES512 when > OpenSSL::PKey::EC key given behaves like success_signature_verification with > blank payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:2:1]' # JSON::JWS#verify! ES512 > when OpenSSL::PKey::EC key given behaves like success_signature_verification > with blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:3:1]' # JSON::JWS#verify! ES512 > when OpenSSL::PKey::EC key given behaves like success_signature_verification > with blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:9:2:1:1]' # JSON::JWS#verify! ES512 when > JSON::JWK key given behaves like success_signature_verification is expected > not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:9:2:1:2:1]' # JSON::JWS#verify! ES512 when > JSON::JWK key given behaves like success_signature_verification header should > be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:9:2:1:3:1]' # JSON::JWS#verify! ES512 when > JSON::JWK key given behaves like success_signature_verification claims should > be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:1]' # JSON::JWS#verify! ES512 when > JSON::JWK key given behaves like success_signature_verification with blank > payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:2:1]' # JSON::JWS#verify! ES512 > when JSON::JWK key given behaves like success_signature_verification with > blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:3:1]' # JSON::JWS#verify! ES512 > when JSON::JWK key given behaves like success_signature_verification with > blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:10:1:1:1]' # JSON::JWS#verify! ES256K when > OpenSSL::PKey::EC key given behaves like success_signature_verification is > expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:10:1:1:2:1]' # JSON::JWS#verify! ES256K > when OpenSSL::PKey::EC key given behaves like success_signature_verification > header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:10:1:1:3:1]' # JSON::JWS#verify! ES256K > when OpenSSL::PKey::EC key given behaves like success_signature_verification > claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:1]' # JSON::JWS#verify! ES256K > when OpenSSL::PKey::EC key given behaves like success_signature_verification > with blank payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:2:1]' # JSON::JWS#verify! ES256K > when OpenSSL::PKey::EC key given behaves like success_signature_verification > with blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:3:1]' # JSON::JWS#verify! ES256K > when OpenSSL::PKey::EC key given behaves like success_signature_verification > with blank payload claims should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:10:2:1:1]' # JSON::JWS#verify! ES256K when > JSON::JWK key given behaves like success_signature_verification is expected > not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:10:2:1:2:1]' # JSON::JWS#verify! ES256K > when JSON::JWK key given behaves like success_signature_verification header > should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:10:2:1:3:1]' # JSON::JWS#verify! ES256K > when JSON::JWK key given behaves like success_signature_verification claims > should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:1]' # JSON::JWS#verify! ES256K > when JSON::JWK key given behaves like success_signature_verification with > blank payload is expected not to raise Exception > rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:2:1]' # JSON::JWS#verify! ES256K > when JSON::JWK key given behaves like success_signature_verification with > blank payload header should be parsed successfully > rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:3:1]' # JSON::JWS#verify! ES256K > when JSON::JWK key given behaves like success_signature_verification with > blank payload claims should be parsed successfully > rspec ./spec/json/jwt_spec.rb:67 # JSON::JWT#sign when no algirithm specified > when key is EC key when prime256v1 alg > rspec ./spec/json/jwt_spec.rb:72 # JSON::JWT#sign when no algirithm specified > when key is EC key when secp384r1 alg > rspec ./spec/json/jwt_spec.rb:77 # JSON::JWT#sign when no algirithm specified > when key is EC key when secp521r1 alg > rspec ./spec/json/jwt_spec.rb:82 # JSON::JWT#sign when no algirithm specified > when key is EC key when secp256k1 alg > rspec ./spec/json/jwt_spec.rb:93 # JSON::JWT#sign when no algirithm specified > when key is JWK with kty=RSA alg > rspec ./spec/json/jwt_spec.rb:99 # JSON::JWT#sign when no algirithm specified > when key is JWK with kty=EC when prime256v1 alg > rspec ./spec/json/jwt_spec.rb:104 # JSON::JWT#sign when no algirithm > specified when key is JWK with kty=EC when secp384r1 alg > rspec ./spec/json/jwt_spec.rb:109 # JSON::JWT#sign when no algirithm > specified when key is JWK with kty=EC when secp521r1 alg > rspec ./spec/json/jwt_spec.rb:114 # JSON::JWT#sign when no algirithm > specified when key is JWK with kty=EC when secp256k1 alg > rspec ./spec/json/jwt_spec.rb:129 # JSON::JWT#sign when JWK is given should > set kid header automatically > > /usr/bin/ruby3.0 > -I/usr/share/rubygems-integration/all/gems/rspec-support-3.10.3/lib:/usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/lib > /usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/exe/rspec > --pattern ./spec/\*\*/\*_spec.rb --format documentation failed > ERROR: Test "ruby3.0" failed: The full build log is available from: http://qa-logs.debian.net/2022/05/25/ruby-json-jwt_1.13.0-1_unstable.log All bugs filed during this archive rebuild are listed at: https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20220525;[email protected] or: https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20220525&[email protected]&allbugs=1&cseverity=1&ctags=1&caffected=1#results A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! If you reassign this bug to another package, please marking it as 'affects'-ing this package. See https://www.debian.org/Bugs/server-control#affects If you fail to reproduce this, please provide a build log and diff it with mine so that we can identify if something relevant changed in the meantime.

