Your message dated Mon, 18 Apr 2022 06:19:04 +0000
with message-id <e1ngkj2-0000gy...@fasolo.debian.org>
and subject line Bug#1009514: fixed in node-http-signature 1.3.6-2
has caused the Debian Bug report #1009514,
regarding node-http-signature: FTBFS: ERROR: Coverage for statements (88.86%) 
does not meet global threshold (100%)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1009514: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009514
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: node-http-signature
Version: 1.3.6-1
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-20220412 ftbfs-bookworm

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.


Relevant part (hopefully):
>  debian/rules binary
> dh binary
>    dh_update_autotools_config
>    dh_autoreconf
>    dh_auto_configure --buildsystem=nodejs
>    dh_auto_build --buildsystem=nodejs
> No build command found, searching known files
>    dh_auto_test --buildsystem=nodejs
>       mkdir -p node_modules
>       ln -s ../. node_modules/http-signature
>       /bin/sh -ex debian/tests/pkg-js/test
> + set -e
> + set -x
> + mkdir -p node_modules
> + nodepath uuid
> + ln -s /usr/share/nodejs/uuid node_modules/uuid
> + + ls -1 test/convert.test.js test/examples.test.js test/header.test.js 
> test/parser.test.js test/signer.test.js test/verify.test.js
> + grep -v examples.test.jsxargs tap
> 
> TAP version 13
> (node:3386692) DeprecationWarning: strictEqual() is deprecated, use equal() 
> instead
> (Use `node --trace-deprecation ...` to show where the warning was created)
> (node:3386690) DeprecationWarning: similar() is deprecated, use match() 
> instead
> (Use `node --trace-deprecation ...` to show where the warning was created)
> ok 1 - test/convert.test.js # time=54.359ms {
>     # Subtest: 1024b pem to rsa ssh key
>         ok 1 - should be equal
>         1..1
>     ok 1 - 1024b pem to rsa ssh key # time=11.31ms
>     
>     # Subtest: 2048b pem to rsa ssh key
>         ok 1 - should be equal
>         1..1
>     ok 2 - 2048b pem to rsa ssh key # time=1.899ms
>     
>     # Subtest: 4096b pem to rsa ssh key
>         ok 1 - should be equal
>         1..1
>     ok 3 - 4096b pem to rsa ssh key # time=1.317ms
>     
>     # Subtest: 1024b rsa ssh key
>         ok 1 - should be equal
>         1..1
>     ok 4 - 1024b rsa ssh key # time=4.391ms
>     
>     # Subtest: 2048b rsa ssh key
>         ok 1 - should be equal
>         1..1
>     ok 5 - 2048b rsa ssh key # time=1.725ms
>     
>     # Subtest: 4096b rsa ssh key
>         ok 1 - should be equal
>         1..1
>     ok 6 - 4096b rsa ssh key # time=1.259ms
>     
>     # Subtest: 1024b dsa ssh key
>         ok 1 - should be equal
>         1..1
>     ok 7 - 1024b dsa ssh key # time=1.372ms
>     
>     # Subtest: fingerprint
>         ok 1 - should be equal
>         1..1
>     ok 8 - fingerprint # time=1.812ms
>     
>     1..8
>     # time=54.359ms
> }
> 
> ok 2 - test/header.test.js # time=57.763ms {
>     # Subtest: setup
>         ok 1 - expect truthy value
>         1..1
>     ok 1 - setup # time=24.26ms
>     
>     # Subtest: header with 0 value
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date 
> request-line 
> content-length",signature="NRctKcjZL6WMsVFt9743vikccJbov/yc81S+PT0tORXManGTceNIQs2HxCil0h2ZcI8KLU3Q712GAUA23J5U2wTcoVfiPM/u9DTR9Up2lwlYVb5XrhGv62cRL9PUtEezcilB2sbYAUaancgTiJiFTKqqaaKwO6Z/cBR2/60miMo="
>         1..2
>     ok 2 - header with 0 value # time=21.622ms
>     
>     # Subtest: header with boolean-mungable value
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date 
> x-foo",signature="qx1pW4xEuEIzmctlcxoUH8f1Q0xsqUNYv6NHOJKvbMIuuTe7m211s9IRDS5p+NBh5YcTTLIuOSyAmCUGFL29e+WZpFZ1FXvOoIeDSf7B95xYZ+nWAMRaV+rJnoyJumnH0mlTUO637UWw8VyCGqYuUtN5T3rqkZHNIZL85lTcAKA="
>         1..2
>     ok 3 - header with boolean-mungable value # time=5.466ms
>     
>     # Subtest: tear down
>         1..0
>     ok 4 - tear down # time=0.988ms
>     
>     1..4
>     # time=57.763ms
> }
> 
> (node:3386693) [DEP0005] DeprecationWarning: Buffer() is deprecated due to 
> security and usability issues. Please use the Buffer.alloc(), 
> Buffer.allocUnsafe(), or Buffer.from() methods instead.
> (Use `node --trace-deprecation ...` to show where the warning was created)
> ok 3 - test/parser.test.js # time=1385.694ms {
>     # Subtest: setup
>         1..0
>     ok 1 - setup # time=55.947ms
>     
>     # Subtest: no authorization
>         ok 1 - should be equal
>         ok 2 - should be equal
>         1..2
>     ok 2 - no authorization # time=14.118ms
>     
>     # Subtest: bad scheme
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 3 - bad scheme # time=4.425ms
>     
>     # Subtest: no key id
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 4 - no key id # time=2.807ms
>     
>     # Subtest: key id no value
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 5 - key id no value # time=2.451ms
>     
>     # Subtest: key id no quotes
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 6 - key id no quotes # time=2.438ms
>     
>     # Subtest: key id param quotes
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 7 - key id param quotes # time=2.137ms
>     
>     # Subtest: param name with space
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 8 - param name with space # time=2.233ms
>     
>     # Subtest: no algorithm
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 9 - no algorithm # time=2.142ms
>     
>     # Subtest: algorithm no value
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 10 - algorithm no value # time=2.155ms
>     
>     # Subtest: no signature
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 11 - no signature # time=2.024ms
>     
>     # Subtest: invalid algorithm
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 12 - invalid algorithm # time=5.781ms
>     
>     # Subtest: no date header
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 13 - no date header # time=3.105ms
>     
>     # Subtest: valid numeric parameter
>         ok 1 - should be equal
>         1..1
>     ok 14 - valid numeric parameter # time=3.4ms
>     
>     # Subtest: invalid numeric parameter
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 15 - invalid numeric parameter # time=3.013ms
>     
>     # Subtest: invalid numeric parameter - decimal
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 16 - invalid numeric parameter - decimal # time=3.336ms
>     
>     # Subtest: invalid numeric parameter - signed integer
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 17 - invalid numeric parameter - signed integer # time=3.013ms
>     
>     # Subtest: created in future
>         ok 1 - should be equal
>         ok 2 - should match pattern provided
>         ok 3 - should be equal
>         1..3
>     ok 18 - created in future # time=6.322ms
>     
>     # Subtest: expires expired
>         ok 1 - should be equal
>         ok 2 - should match pattern provided
>         ok 3 - should be equal
>         1..3
>     ok 19 - expires expired # time=2.686ms
>     
>     # Subtest: valid created and expires with skew
>         ok 1 - should be equal
>         1..1
>     ok 20 - valid created and expires with skew # time=1.91ms
>     
>     # Subtest: valid default headers
>         ok 1 - should be equal
>         1..1
>     ok 21 - valid default headers # time=2.327ms
>     
>     # Subtest: valid custom authorizationHeaderName
>         ok 1 - should be equal
>         1..1
>     ok 22 - valid custom authorizationHeaderName # time=1.778ms
>     
>     # Subtest: explicit headers missing
>         ok 1 - should be equal
>         1..1
>     ok 23 - explicit headers missing # time=1.697ms
>     
>     # Subtest: valid explicit headers request-line
>         ok 1 - should be equal
>     {
>       "scheme": "Signature",
>       "params": {
>       },
>       "signingString": "date: Tue, 12 Apr 2022 16:45:59 GMT\ndigest: 
> a37fc744-0e9a-4c72-a660-5bbd4fcb14b5\nGET / HTTP/1.1",
>       "algorithm": "RSA-SHA256",
>       "keyId": "fo,o"
>     }
>         "keyId": "fo,o",
>         "algorithm": "rsa-sha256",
>         "headers": [
>           "date",
>           "digest",
>           "request-line"
>         ],
>         "extensions": "blah blah",
>         "signature": "digitalSignature"
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - expect truthy value
>         ok 5 - should be equal
>         ok 6 - should be equal
>         ok 7 - should be equal
>         ok 8 - expect truthy value
>         ok 9 - should be equal
>         ok 10 - should be equal
>         ok 11 - should be equal
>         ok 12 - should be equal
>         ok 13 - should be equal
>         ok 14 - expect truthy value
>         ok 15 - should be equal
>         ok 16 - should be equal
>         ok 17 - should be equal
>         1..17
>     ok 24 - valid explicit headers request-line # time=4.876ms
>     
>     # Subtest: valid explicit headers request-line strict true
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 25 - valid explicit headers request-line strict true # time=2.412ms
>     
>     # Subtest: valid explicit headers request-target
>         ok 1 - should be equal
>     {
>       "scheme": "Signature",
>       "params": {
>       },
>       "signingString": "date: Tue, 12 Apr 2022 16:45:59 GMT\ndigest: 
> 27399012-23e6-45c0-b147-466332b71d4c\n(request-target): get /",
>       "algorithm": "RSA-SHA256",
>       "keyId": "fo,o"
>     }
>         "keyId": "fo,o",
>         "algorithm": "rsa-sha256",
>         "headers": [
>           "date",
>           "digest",
>           "(request-target)"
>         ],
>         "extensions": "blah blah",
>         "signature": "digitalSignature"
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - expect truthy value
>         ok 5 - should be equal
>         ok 6 - should be equal
>         ok 7 - should be equal
>         ok 8 - expect truthy value
>         ok 9 - should be equal
>         ok 10 - should be equal
>         ok 11 - should be equal
>         ok 12 - should be equal
>         ok 13 - should be equal
>         ok 14 - expect truthy value
>         ok 15 - should be equal
>         ok 16 - should be equal
>         ok 17 - should be equal
>         1..17
>     ok 26 - valid explicit headers request-target # time=5.876ms
>     
>     # Subtest: expired
>         ok 1 - should be equal
>         1..1
>     ok 27 - expired # time=1210.667ms
>     
>     # Subtest: missing required header
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 28 - missing required header # time=7.159ms
>     
>     # Subtest: valid mixed case headers
>         ok 1 - should be equal
>         1..1
>     ok 29 - valid mixed case headers # time=2.99ms
>     
>     # Subtest: not whitelisted algorithm
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 30 - not whitelisted algorithm # time=3.313ms
>     
>     # Subtest: tearDown
>         1..0
>     ok 31 - tearDown # time=1.106ms
>     
>     1..31
>     # time=1385.694ms
> }
> 
> ok 4 - test/signer.test.js # time=179.941ms {
>     # Subtest: setup
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - expect truthy value
>         ok 4 - expect truthy value
>         1..4
>     ok 1 - setup # time=34.521ms
>     
>     # Subtest: defaults
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - expect truthy value
>         ok 5 - expect truthy value
>     > Signature 
> keyId="unitTest",algorithm="rsa-sha256",signature="VA4j7tIyy86iUX88YfK8utPgFWDpnDwuP/B5+QCj2+nCMVJbMKQaE4TqAnguU6Fnj4PcM2ZheePetcIMk7zaqx/XZ2fPiixYei0r3tmrkqTwcfxe1Dv4fZclx8x9aGyb7JPV9YboYDxaY4q152UjYLiWj+/Biev2jfBj3mFyhxQ="
>         1..5
>     ok 2 - defaults # time=36.755ms
>     
>     # Subtest: with custom authorizationHeaderName
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - expect truthy value
>         ok 5 - expect truthy value
>     > Signature 
> keyId="unitTest",algorithm="rsa-sha256",signature="VA4j7tIyy86iUX88YfK8utPgFWDpnDwuP/B5+QCj2+nCMVJbMKQaE4TqAnguU6Fnj4PcM2ZheePetcIMk7zaqx/XZ2fPiixYei0r3tmrkqTwcfxe1Dv4fZclx8x9aGyb7JPV9YboYDxaY4q152UjYLiWj+/Biev2jfBj3mFyhxQ="
>         1..5
>     ok 3 - with custom authorizationHeaderName # time=6.09ms
>     
>     # Subtest: request line strict unspecified
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date 
> request-line",signature="eYBWX7Rhh0xpM4GwTNyBurzuXrbot9GMXkKSKsyot5RopcPVYZFpD3mv2LyRRgDgKiVkjR7tjQjezgHdzB35T1f7GFScVmWYYKRf2Cn7r5XgFRMnKpVn2FfH3qtHWBlT9tRF1OyKqxd31rfIsIfxlEh/Xf4MGiD7nHV4RXAjNAY="
>         1..4
>     ok 4 - request line strict unspecified # time=3.45ms
>     
>     # Subtest: request line strict false
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - expect truthy value
>         ok 4 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date 
> request-line",signature="eYBWX7Rhh0xpM4GwTNyBurzuXrbot9GMXkKSKsyot5RopcPVYZFpD3mv2LyRRgDgKiVkjR7tjQjezgHdzB35T1f7GFScVmWYYKRf2Cn7r5XgFRMnKpVn2FfH3qtHWBlT9tRF1OyKqxd31rfIsIfxlEh/Xf4MGiD7nHV4RXAjNAY="
>         1..4
>     ok 5 - request line strict false # time=3.233ms
>     
>     # Subtest: request line strict true
>         ok 1 - expected to throw
>         1..1
>     ok 6 - request line strict true # time=2.71ms
>     
>     # Subtest: request target
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date 
> (request-target)",signature="IHR8HPwxmjeKpSkESDHHJw4THi38hB9kXzRdedCIdXIEXyJjvM6sC2d4XJfJ22orV3XYfe1748fRrMmrtpHJ3UZ5DD/54MNKs8R4HylTd0o4qywiUDZKGNyvE1s2D6Aa+DR18dXZdJRUVIIdt74euwisXgmWeQ0SjCSniExLHLA="
>         1..4
>     ok 7 - request target # time=3.062ms
>     
>     # Subtest: keyid
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date 
> (keyid)",signature="O4fxxHfYzP+JdMf+9Uvhx7I55mH4R7ygRN67QxCabRE+xJZOfk/BSeVVDzmdSuHaCSYfnyBA6QQ+jO1elb6XjVjsX9iXA/X6wWubcFct5PrOhUrOZRDsBD3s39BFJTZe40Rr6b8Fa/2CkRiupbR3Q+EiOZBeBMHgkfw/0syrwWY="
>         1..4
>     ok 8 - keyid # time=5.865ms
>     
>     # Subtest: signing algorithm
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - should be equal
>         ok 5 - should be equal
>         ok 6 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date 
> (algorithm)",signature="KlzRtJmzdVrKdY2mJt9KqdopVe3EFslxyOeS+b9Dy/N6RIC8Xt1+BC2x4BMT2yTdscuo8tHEcT+ZzCKg2P3uTgPwc6+gTggqT+51+XqRe7FsbiVBzv6WQ4zlsCBjbvJKizgeFal5+K+9Ovvl/R21s9mFDNNbbsWcV1/+PM4tIrA="
>         1..6
>     ok 9 - signing algorithm # time=5.186ms
>     
>     # Subtest: signing with unspecified algorithm
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - should be equal
>         ok 5 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date 
> (algorithm)",signature="KlzRtJmzdVrKdY2mJt9KqdopVe3EFslxyOeS+b9Dy/N6RIC8Xt1+BC2x4BMT2yTdscuo8tHEcT+ZzCKg2P3uTgPwc6+gTggqT+51+XqRe7FsbiVBzv6WQ4zlsCBjbvJKizgeFal5+K+9Ovvl/R21s9mFDNNbbsWcV1/+PM4tIrA="
>         1..5
>     ok 10 - signing with unspecified algorithm # time=4.703ms
>     
>     # Subtest: signing opaque param
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - should be equal
>         ok 5 - expect truthy value
>     > Signature 
> keyId="unit",algorithm="rsa-sha256",opaque="opaque",headers="date 
> (opaque)",signature="NU5Hye5p+VJs+fVSphcfRMaNX7NzH1S++eM0fl81+Gj96bk3qjYhGbS4Dm8iEvlJ9tSg6s4hQzdiFA9pYysYt90mNIAYsapbGx/vSrmqctBNYDUbwFGnqLPGNzZz2nCxJ6UGpvg7QLvGNYJVGPVMOu8NfAoS1enolp5ZgSQsh3Y="
>         1..5
>     ok 11 - signing opaque param # time=3.784ms
>     
>     # Subtest: signing with key protected with passphrase
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - should be equal
>         ok 5 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date 
> (algorithm)",signature="D4M8vJ1MO/rovjNpaavF7oqq3A5Ij6FsKpipktpgbG8sd8p31hfjpC8KcOrhPIRSPmAWaWVcKut2oPWDinOP5HNyr7ecH7iKARjF3n6VSglBBRTghAdA8ZMsxPoUmT1DxFNjqdMaltpACvHMbUrhhVvfwM7pizdvfB191HXpPvc="
>         1..5
>     ok 12 - signing with key protected with passphrase # time=23.484ms
>     
>     # Subtest: request-target with dsa key
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>     > Signature keyId="unit",algorithm="dsa-sha1",headers="date 
> (request-target)",signature="MC0CFQCRavKIky29gtgKvY4PIaOODxr3CwIUMZgM9MUc/Iah1Iq1M3PhaasHm70="
>         1..2
>     ok 13 - request-target with dsa key # time=3.086ms
>     
>     # Subtest: request-target with ecdsa key
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>     > Signature keyId="unit",algorithm="ecdsa-sha256",headers="date 
> (request-target)",signature="MEUCIQDLw5IevWyMt2BPKbWRbE6BATJB9klREzOzRiSN2mG9hAIgL1IGBR+Ode0L00/udQbZFXeJKzdwsDkiPx9+of27fyE="
>         1..2
>     ok 14 - request-target with ecdsa key # time=3.203ms
>     
>     # Subtest: hmac
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>     > Signature 
> keyId="unit",algorithm="hmac-sha1",signature="1IBR42MK7/IXJGqsdf0mT3R9JLQ="
>         1..2
>     ok 15 - hmac # time=1.936ms
>     
>     # Subtest: createSigner with RSA key
>         ok 1 - should not error
>     > Signature keyId="foo",algorithm="rsa-sha1",headers="(request-target) 
> date",signature="XosDwHJYgyUJK5Q5TOqP7xOUF2CEvlp9PGPCdeyJmRELr4/sE+uVyvrMHkqDvK7LnJinloE/43uB1WWmBNfOM2jhbmRkdsrivZsyENiRVkuy9sae23thmm7wunyovKtSIninm8yhUrmxqavdV57n5CrZaQBqTeQxUCroA6NTUe8="
>         1..1
>     ok 16 - createSigner with RSA key # time=3.419ms
>     
>     # Subtest: createSigner with RSA key, auto algo
>         ok 1 - should not error
>         1..1
>     ok 17 - createSigner with RSA key, auto algo # time=2.526ms
>     
>     # Subtest: createSigner with RSA key, auto algo, passphrase
>         ok 1 - should not error
>         1..1
>     ok 18 - createSigner with RSA key, auto algo, passphrase # time=18.448ms
>     
>     # Subtest: createSigner with HMAC key
>         ok 1 - should not error
>         1..1
>     ok 19 - createSigner with HMAC key # time=2.143ms
>     
>     # Subtest: createSigner with sign function
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - should not error
>         ok 5 - expect truthy value
>         1..5
>     ok 20 - createSigner with sign function # time=2.512ms
>     
>     # Subtest: tear down
>         1..0
>     ok 21 - tear down # time=0.9ms
>     
>     1..21
>     # time=179.941ms
> }
> 
> ok 5 - test/verify.test.js # time=162.933ms {
>     # Subtest: setup
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - expect truthy value
>         ok 4 - expect truthy value
>         ok 5 - expect truthy value
>         ok 6 - expect truthy value
>         1..6
>     ok 1 - setup # time=77.921ms
>     
>     # Subtest: invalid hmac
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 2 - invalid hmac # time=20.206ms
>     
>     # Subtest: valid hmac
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 3 - valid hmac # time=4.537ms
>     
>     # Subtest: invalid raw hmac
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 4 - invalid raw hmac # time=2.759ms
>     
>     # Subtest: valid raw hmac
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 5 - valid raw hmac # time=2.677ms
>     
>     # Subtest: invalid rsa
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 6 - invalid rsa # time=7.013ms
>     
>     # Subtest: valid rsa
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 7 - valid rsa # time=4.177ms
>     
>     # Subtest: invalid dsa
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 8 - invalid dsa # time=3.081ms
>     
>     # Subtest: valid dsa
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 9 - valid dsa # time=4.951ms
>     
>     # Subtest: invalid ecdsa
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 10 - invalid ecdsa # time=3.347ms
>     
>     # Subtest: valid ecdsa
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 11 - valid ecdsa # time=3.475ms
>     
>     # Subtest: invalid date
>         ok 1 - expected to throw
>         ok 2 - should be equal
>         1..2
>     ok 12 - invalid date # time=3.307ms
>     
>     # Subtest: valid rsa from spec default
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         1..3
>     ok 13 - valid rsa from spec default # time=3.347ms
>     
>     # Subtest: valid rsa from spec default
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         1..3
>     ok 14 - valid rsa from spec default # time=3.915ms
>     
>     # Subtest: valid rsa from spec all headers
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         1..3
>     ok 15 - valid rsa from spec all headers # time=3.536ms
>     
>     # Subtest: valid rsa from spec all headers (request-target)
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         1..3
>     ok 16 - valid rsa from spec all headers (request-target) # time=3.321ms
>     
>     # Subtest: tear down
>         1..0
>     ok 17 - tear down # time=0.81ms
>     
>     1..17
>     # time=162.933ms
> }
> 
> 1..5
> # time=3161.751ms
> ERROR: Coverage for lines (88.81%) does not meet global threshold (100%)
> ERROR: Coverage for functions (93.1%) does not meet global threshold (100%)
> ERROR: Coverage for branches (77.86%) does not meet global threshold (100%)
> ERROR: Coverage for statements (88.86%) does not meet global threshold (100%)
> -----------|---------|----------|---------|---------|-----------------------------------------------
> File       | % Stmts | % Branch | % Funcs | % Lines | Uncovered Line #s       
>                       
> -----------|---------|----------|---------|---------|-----------------------------------------------
> All files  |   88.86 |    77.86 |    93.1 |   88.81 |                         
>                       
>  index.js  |     100 |      100 |     100 |     100 |                         
>                       
>  parser.js |   92.07 |    85.59 |     100 |   92.02 | 
> 172,223,228,233,240,269,295,297,299-304,325   
>  signer.js |   85.32 |     72.8 |   85.71 |   85.25 | 
> ...49,360,367,387,416,420-422,424-430,434,458 
>  utils.js  |   93.75 |    66.66 |     100 |   93.75 | 47,52                   
>                       
>  verify.js |   89.74 |    66.66 |     100 |   89.74 | 35,58,81,84             
>                       
> -----------|---------|----------|---------|---------|-----------------------------------------------
> dh_auto_test: error: /bin/sh -ex debian/tests/pkg-js/test returned exit code 
> 123


The full build log is available from:
http://qa-logs.debian.net/2022/04/12/node-http-signature_1.3.6-1_unstable.log

All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20220412;users=lu...@debian.org
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20220412&fusertaguser=lu...@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

If you reassign this bug to another package, please marking it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.

--- End Message ---
--- Begin Message ---
Source: node-http-signature
Source-Version: 1.3.6-2
Done: Yadd <y...@debian.org>

We believe that the bug you reported is fixed in the latest version of
node-http-signature, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1009...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Yadd <y...@debian.org> (supplier of updated node-http-signature package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 18 Apr 2022 08:07:33 +0200
Source: node-http-signature
Architecture: source
Version: 1.3.6-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Javascript Maintainers 
<pkg-javascript-de...@lists.alioth.debian.org>
Changed-By: Yadd <y...@debian.org>
Closes: 1009514
Changes:
 node-http-signature (1.3.6-2) unstable; urgency=medium
 .
   * Team upload
   * Fix test for tap >= 15 (--no-cov) (Closes: #1009514)
Checksums-Sha1: 
 d63c11b274e7de334bc09b8ae6b3b6e8dca18b47 2222 node-http-signature_1.3.6-2.dsc
 c39b7786b8a77703e6dab75361ee67b5dd2355ae 3424 
node-http-signature_1.3.6-2.debian.tar.xz
Checksums-Sha256: 
 c2d6603d5870f2a6c3a262a6063f66f41a7a81a918b4bd80ab876cc1cb9dde45 2222 
node-http-signature_1.3.6-2.dsc
 736c5778392f80dcc9c1e6a4c56a1be807bfa8518a233dc4afbe2cb83638d372 3424 
node-http-signature_1.3.6-2.debian.tar.xz
Files: 
 0d90b8658d66821da4eddf84c07413e4 2222 javascript optional 
node-http-signature_1.3.6-2.dsc
 1b1cacc9d49ba94c5aeead8cb3eb42f5 3424 javascript optional 
node-http-signature_1.3.6-2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=fJuB
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to