Source: ruby-json-jwt
Version: 1.13.0-1
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: [email protected]
Usertags: ftbfs-20220525 ftbfs-bookworm

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.


Relevant part (hopefully):
>        Failure/Error: key.set_key n, e, d
> 
>        OpenSSL::PKey::PKeyError:
>          rsa#set_key= is incompatible with OpenSSL 3.0
>        # ./lib/json/jwk.rb:106:in `set_key'
>        # ./lib/json/jwk.rb:106:in `to_rsa_key'
>        # ./lib/json/jwk.rb:43:in `to_key'
>        # ./lib/json/jose.rb:27:in `with_jwk_support'
>        # ./lib/json/jws.rb:100:in `sign'
>        # ./lib/json/jws.rb:17:in `sign!'
>        # ./lib/json/jwt.rb:35:in `sign'
>        # ./spec/json/jwt_spec.rb:130:in `block (4 levels) in <top (required)>'
> 
> Finished in 0.7193 seconds (files took 0.45001 seconds to load)
> 380 examples, 117 failures, 6 pending
> 
> Failed examples:
> 
> rspec ./spec/interop/with_jsrsasign_spec.rb:41 # interop with jsrsasign JWS 
> verify should succeed
> rspec ./spec/json/jwk_spec.rb:105 # JSON::JWK when RSA public key given 
> #to_key 
> rspec ./spec/json/jwk_spec.rb:139 # JSON::JWK when EC public key given 
> unknown curve 
> rspec ./spec/json/jwk_spec.rb:160 # JSON::JWK when EC public key given 
> #to_key 
> rspec ./spec/json/jwk_spec.rb:187 # JSON::JWK unknown key type 
> rspec './spec/json/jws_spec.rb[1:4:4:2:1:1]' # JSON::JWS#sign! RS256 when 
> JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:4:2:1:2:1]' # JSON::JWS#sign! RS256 when 
> JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:4:2:2:1]' # JSON::JWS#sign! RS256 when 
> JSON::JWK key given behaves like generate_expected_signature 
> rspec './spec/json/jws_spec.rb[1:4:4:2:2:2:1]' # JSON::JWS#sign! RS256 when 
> JSON::JWK key given behaves like generate_expected_signature with blank 
> payload 
> rspec './spec/json/jws_spec.rb[1:4:5:2:1:1]' # JSON::JWS#sign! RS384 when 
> JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:5:2:1:2:1]' # JSON::JWS#sign! RS384 when 
> JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:5:2:2:1]' # JSON::JWS#sign! RS384 when 
> JSON::JWK key given behaves like generate_expected_signature 
> rspec './spec/json/jws_spec.rb[1:4:5:2:2:2:1]' # JSON::JWS#sign! RS384 when 
> JSON::JWK key given behaves like generate_expected_signature with blank 
> payload 
> rspec './spec/json/jws_spec.rb[1:4:6:2:1:1]' # JSON::JWS#sign! RS512 when 
> JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:6:2:1:2:1]' # JSON::JWS#sign! RS512 when 
> JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:6:2:2:1]' # JSON::JWS#sign! RS512 when 
> JSON::JWK key given behaves like generate_expected_signature 
> rspec './spec/json/jws_spec.rb[1:4:6:2:2:2:1]' # JSON::JWS#sign! RS512 when 
> JSON::JWK key given behaves like generate_expected_signature with blank 
> payload 
> rspec './spec/json/jws_spec.rb[1:4:7:1:1:1]' # JSON::JWS#sign! ES256 when 
> OpenSSL::PKey::EC key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:7:1:1:2:1]' # JSON::JWS#sign! ES256 when 
> OpenSSL::PKey::EC key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:7:1:2:1]' # JSON::JWS#sign! ES256 when 
> OpenSSL::PKey::EC key given behaves like self_verifiable should be 
> self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:7:2:1:1]' # JSON::JWS#sign! ES256 when 
> JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:7:2:1:2:1]' # JSON::JWS#sign! ES256 when 
> JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:7:2:2:1]' # JSON::JWS#sign! ES256 when 
> JSON::JWK key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:8:1:1:1]' # JSON::JWS#sign! ES384 when 
> OpenSSL::PKey::EC key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:8:1:1:2:1]' # JSON::JWS#sign! ES384 when 
> OpenSSL::PKey::EC key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:8:1:2:1]' # JSON::JWS#sign! ES384 when 
> OpenSSL::PKey::EC key given behaves like self_verifiable should be 
> self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:8:2:1:1]' # JSON::JWS#sign! ES384 when 
> JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:8:2:1:2:1]' # JSON::JWS#sign! ES384 when 
> JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:8:2:2:1]' # JSON::JWS#sign! ES384 when 
> JSON::JWK key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:9:1:1:1]' # JSON::JWS#sign! ES512 when 
> OpenSSL::PKey::EC key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:9:1:1:2:1]' # JSON::JWS#sign! ES512 when 
> OpenSSL::PKey::EC key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:9:1:2:1]' # JSON::JWS#sign! ES512 when 
> OpenSSL::PKey::EC key given behaves like self_verifiable should be 
> self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:9:2:1:1]' # JSON::JWS#sign! ES512 when 
> JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:9:2:1:2:1]' # JSON::JWS#sign! ES512 when 
> JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:9:2:2:1]' # JSON::JWS#sign! ES512 when 
> JSON::JWK key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:10:1:1:1]' # JSON::JWS#sign! ES256K when 
> OpenSSL::PKey::EC key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:10:1:1:2:1]' # JSON::JWS#sign! ES256K when 
> OpenSSL::PKey::EC key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:10:1:2:1]' # JSON::JWS#sign! ES256K when 
> OpenSSL::PKey::EC key given behaves like self_verifiable should be 
> self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:10:2:1:1]' # JSON::JWS#sign! ES256K when 
> JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:10:2:1:2:1]' # JSON::JWS#sign! ES256K when 
> JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:10:2:2:1]' # JSON::JWS#sign! ES256K when 
> JSON::JWK key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:1]' # JSON::JWS#verify! RS256 when 
> JSON::JWK key given behaves like success_signature_verification is expected 
> not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:2:1]' # JSON::JWS#verify! RS256 when 
> JSON::JWK key given behaves like success_signature_verification header should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:3:1]' # JSON::JWS#verify! RS256 when 
> JSON::JWK key given behaves like success_signature_verification claims should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:1]' # JSON::JWS#verify! RS256 when 
> JSON::JWK key given behaves like success_signature_verification with blank 
> payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:2:1]' # JSON::JWS#verify! RS256 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:3:1]' # JSON::JWS#verify! RS256 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:1]' # JSON::JWS#verify! RS384 when 
> JSON::JWK key given behaves like success_signature_verification is expected 
> not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:2:1]' # JSON::JWS#verify! RS384 when 
> JSON::JWK key given behaves like success_signature_verification header should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:3:1]' # JSON::JWS#verify! RS384 when 
> JSON::JWK key given behaves like success_signature_verification claims should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:1]' # JSON::JWS#verify! RS384 when 
> JSON::JWK key given behaves like success_signature_verification with blank 
> payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:2:1]' # JSON::JWS#verify! RS384 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:3:1]' # JSON::JWS#verify! RS384 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:1]' # JSON::JWS#verify! RS512 when 
> JSON::JWK key given behaves like success_signature_verification is expected 
> not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:2:1]' # JSON::JWS#verify! RS512 when 
> JSON::JWK key given behaves like success_signature_verification header should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:3:1]' # JSON::JWS#verify! RS512 when 
> JSON::JWK key given behaves like success_signature_verification claims should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:1]' # JSON::JWS#verify! RS512 when 
> JSON::JWK key given behaves like success_signature_verification with blank 
> payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:2:1]' # JSON::JWS#verify! RS512 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:3:1]' # JSON::JWS#verify! RS512 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:1]' # JSON::JWS#verify! ES256 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification is 
> expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:2:1]' # JSON::JWS#verify! ES256 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification 
> header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:3:1]' # JSON::JWS#verify! ES256 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification 
> claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:1]' # JSON::JWS#verify! ES256 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification with 
> blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:2:1]' # JSON::JWS#verify! ES256 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:3:1]' # JSON::JWS#verify! ES256 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:1]' # JSON::JWS#verify! ES256 when 
> JSON::JWK key given behaves like success_signature_verification is expected 
> not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:2:1]' # JSON::JWS#verify! ES256 when 
> JSON::JWK key given behaves like success_signature_verification header should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:3:1]' # JSON::JWS#verify! ES256 when 
> JSON::JWK key given behaves like success_signature_verification claims should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:1]' # JSON::JWS#verify! ES256 when 
> JSON::JWK key given behaves like success_signature_verification with blank 
> payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:2:1]' # JSON::JWS#verify! ES256 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:3:1]' # JSON::JWS#verify! ES256 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:1]' # JSON::JWS#verify! ES384 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification is 
> expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:2:1]' # JSON::JWS#verify! ES384 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification 
> header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:3:1]' # JSON::JWS#verify! ES384 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification 
> claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:1]' # JSON::JWS#verify! ES384 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification with 
> blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:2:1]' # JSON::JWS#verify! ES384 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:3:1]' # JSON::JWS#verify! ES384 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:1]' # JSON::JWS#verify! ES384 when 
> JSON::JWK key given behaves like success_signature_verification is expected 
> not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:2:1]' # JSON::JWS#verify! ES384 when 
> JSON::JWK key given behaves like success_signature_verification header should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:3:1]' # JSON::JWS#verify! ES384 when 
> JSON::JWK key given behaves like success_signature_verification claims should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:1]' # JSON::JWS#verify! ES384 when 
> JSON::JWK key given behaves like success_signature_verification with blank 
> payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:2:1]' # JSON::JWS#verify! ES384 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:3:1]' # JSON::JWS#verify! ES384 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:1]' # JSON::JWS#verify! ES512 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification is 
> expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:2:1]' # JSON::JWS#verify! ES512 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification 
> header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:3:1]' # JSON::JWS#verify! ES512 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification 
> claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:1]' # JSON::JWS#verify! ES512 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification with 
> blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:2:1]' # JSON::JWS#verify! ES512 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:3:1]' # JSON::JWS#verify! ES512 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:1]' # JSON::JWS#verify! ES512 when 
> JSON::JWK key given behaves like success_signature_verification is expected 
> not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:2:1]' # JSON::JWS#verify! ES512 when 
> JSON::JWK key given behaves like success_signature_verification header should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:3:1]' # JSON::JWS#verify! ES512 when 
> JSON::JWK key given behaves like success_signature_verification claims should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:1]' # JSON::JWS#verify! ES512 when 
> JSON::JWK key given behaves like success_signature_verification with blank 
> payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:2:1]' # JSON::JWS#verify! ES512 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:3:1]' # JSON::JWS#verify! ES512 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:1]' # JSON::JWS#verify! ES256K when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification is 
> expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:2:1]' # JSON::JWS#verify! ES256K 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:3:1]' # JSON::JWS#verify! ES256K 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:1]' # JSON::JWS#verify! ES256K 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:2:1]' # JSON::JWS#verify! ES256K 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:3:1]' # JSON::JWS#verify! ES256K 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:1]' # JSON::JWS#verify! ES256K when 
> JSON::JWK key given behaves like success_signature_verification is expected 
> not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:2:1]' # JSON::JWS#verify! ES256K 
> when JSON::JWK key given behaves like success_signature_verification header 
> should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:3:1]' # JSON::JWS#verify! ES256K 
> when JSON::JWK key given behaves like success_signature_verification claims 
> should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:1]' # JSON::JWS#verify! ES256K 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:2:1]' # JSON::JWS#verify! ES256K 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:3:1]' # JSON::JWS#verify! ES256K 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload claims should be parsed successfully
> rspec ./spec/json/jwt_spec.rb:67 # JSON::JWT#sign when no algirithm specified 
> when key is EC key when prime256v1 alg 
> rspec ./spec/json/jwt_spec.rb:72 # JSON::JWT#sign when no algirithm specified 
> when key is EC key when secp384r1 alg 
> rspec ./spec/json/jwt_spec.rb:77 # JSON::JWT#sign when no algirithm specified 
> when key is EC key when secp521r1 alg 
> rspec ./spec/json/jwt_spec.rb:82 # JSON::JWT#sign when no algirithm specified 
> when key is EC key when secp256k1 alg 
> rspec ./spec/json/jwt_spec.rb:93 # JSON::JWT#sign when no algirithm specified 
> when key is JWK with kty=RSA alg 
> rspec ./spec/json/jwt_spec.rb:99 # JSON::JWT#sign when no algirithm specified 
> when key is JWK with kty=EC when prime256v1 alg 
> rspec ./spec/json/jwt_spec.rb:104 # JSON::JWT#sign when no algirithm 
> specified when key is JWK with kty=EC when secp384r1 alg 
> rspec ./spec/json/jwt_spec.rb:109 # JSON::JWT#sign when no algirithm 
> specified when key is JWK with kty=EC when secp521r1 alg 
> rspec ./spec/json/jwt_spec.rb:114 # JSON::JWT#sign when no algirithm 
> specified when key is JWK with kty=EC when secp256k1 alg 
> rspec ./spec/json/jwt_spec.rb:129 # JSON::JWT#sign when JWK is given should 
> set kid header automatically
> 
> /usr/bin/ruby3.0 
> -I/usr/share/rubygems-integration/all/gems/rspec-support-3.10.3/lib:/usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/lib
>  /usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/exe/rspec 
> --pattern ./spec/\*\*/\*_spec.rb --format documentation failed
> ERROR: Test "ruby3.0" failed: 


The full build log is available from:
http://qa-logs.debian.net/2022/05/25/ruby-json-jwt_1.13.0-1_unstable.log

All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20220525;[email protected]
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20220525&[email protected]&allbugs=1&cseverity=1&ctags=1&caffected=1#results

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

If you reassign this bug to another package, please marking it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.

Reply via email to