Your message dated Thu, 01 Dec 2022 04:36:07 +0000
with message-id <e1p0bit-00g5ja...@fasolo.debian.org>
and subject line Bug#1011711: fixed in ruby-jwt 2.5.0-1
has caused the Debian Bug report #1011711,
regarding ruby-jwt: FTBFS: ERROR: Test "ruby3.0" failed: expect(e).to 
be_a(TypeError)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1011711: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011711
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ruby-jwt
Version: 2.3.0-1
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-20220525 ftbfs-bookworm

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.


Relevant part (hopefully):
>               expect(e).to be_a(TypeError)
>               expect(e.message).to eq('no implicit conversion of 
> OpenSSL::PKey::RSA into String')
>             end
>           end
> 
>         expected #<OpenSSL::PKey::PKeyError: pkeys are immutable on OpenSSL 
> 3.0> to be a kind of NoMethodError
>       # ./spec/jwk/decode_with_jwk_spec.rb:93:in `block (5 levels) in <top 
> (required)>'
> 
> Finished in 9.17 seconds (files took 0.24023 seconds to load)
> 239 examples, 48 failures
> 
> Failed examples:
> 
> rspec ./spec/jwk/ec_spec.rb:11 # JWT::JWK::EC.new when a keypair with both 
> keys given creates an instance of the class
> rspec ./spec/jwk/ec_spec.rb:19 # JWT::JWK::EC.new when a keypair with only 
> public key is given creates an instance of the class
> rspec './spec/jwk/ec_spec.rb[1:3:1:1:1]' # JWT::JWK::EC.import when crv=P-256 
> when keypair is private returns a private key
> rspec './spec/jwk/ec_spec.rb[1:3:1:1:2:1]' # JWT::JWK::EC.import when 
> crv=P-256 when keypair is private with a custom "kid" value imports that 
> "kid" value
> rspec './spec/jwk/ec_spec.rb[1:3:1:2:1:1]' # JWT::JWK::EC.import when 
> crv=P-256 when keypair is public returns a public key returns a hash with the 
> public parts of the key
> rspec './spec/jwk/ec_spec.rb[1:3:2:2:1:1]' # JWT::JWK::EC.import when 
> crv=P-384 when keypair is public returns a public key returns a hash with the 
> public parts of the key
> rspec './spec/jwk/ec_spec.rb[1:3:2:1:1]' # JWT::JWK::EC.import when crv=P-384 
> when keypair is private returns a private key
> rspec './spec/jwk/ec_spec.rb[1:3:2:1:2:1]' # JWT::JWK::EC.import when 
> crv=P-384 when keypair is private with a custom "kid" value imports that 
> "kid" value
> rspec './spec/jwk/ec_spec.rb[1:3:3:2:1:1]' # JWT::JWK::EC.import when 
> crv=P-521 when keypair is public returns a public key returns a hash with the 
> public parts of the key
> rspec './spec/jwk/ec_spec.rb[1:3:3:1:1]' # JWT::JWK::EC.import when crv=P-521 
> when keypair is private returns a private key
> rspec './spec/jwk/ec_spec.rb[1:3:3:1:2:1]' # JWT::JWK::EC.import when 
> crv=P-521 when keypair is private with a custom "kid" value imports that 
> "kid" value
> rspec ./spec/jwk/ec_spec.rb:64 # JWT::JWK::EC#export when private key is 
> requested returns a hash with the both parts of the key
> rspec ./spec/jwk/ec_spec.rb:45 # JWT::JWK::EC#export when keypair with public 
> key is exported returns a hash with the public parts of the key
> rspec ./spec/jwk/ec_spec.rb:55 # JWT::JWK::EC#export when keypair with public 
> key is exported when a custom "kid" is provided exports it
> rspec ./spec/jwk/ec_spec.rb:32 # JWT::JWK::EC#export when keypair with 
> private key is exported returns a hash with the both parts of the key
> rspec ./spec/integration/readme_examples_spec.rb:261 # README.md code test 
> claims JWK
> rspec ./spec/integration/readme_examples_spec.rb:53 # README.md code test 
> algorithm usage ECDSA
> rspec ./spec/jwk_spec.rb:14 # JWT::JWK.import creates a ::JWT::JWK::RSA 
> instance
> rspec ./spec/jwk_spec.rb:36 # JWT::JWK.import when keypair with defined kid 
> is imported returns the predefined kid if jwt_data contains a kid
> rspec ./spec/jwk_spec.rb:21 # JWT::JWK.import parsed from JSON creates a 
> ::JWT::JWK::RSA instance from JSON parsed JWK
> rspec ./spec/jwk_spec.rb:59 # JWT::JWK.new when EC key is given 
> rspec './spec/jwt_spec.rb[1:12:1]' # JWT alg: ES256 should generate a valid 
> token
> rspec './spec/jwt_spec.rb[1:12:2]' # JWT alg: ES256 should decode a valid 
> token
> rspec './spec/jwt_spec.rb[1:12:3]' # JWT alg: ES256 wrong key should raise 
> JWT::DecodeError
> rspec './spec/jwt_spec.rb[1:12:4]' # JWT alg: ES256 wrong key and verify = 
> false should not raise JWT::DecodeError
> rspec ./spec/jwt_spec.rb:342 # JWT Invalid ECDSA curve_name should raise 
> JWT::IncorrectAlgorithm
> rspec './spec/jwt_spec.rb[1:14:4]' # JWT alg: ES512 wrong key and verify = 
> false should not raise JWT::DecodeError
> rspec './spec/jwt_spec.rb[1:14:3]' # JWT alg: ES512 wrong key should raise 
> JWT::DecodeError
> rspec './spec/jwt_spec.rb[1:14:2]' # JWT alg: ES512 should decode a valid 
> token
> rspec './spec/jwt_spec.rb[1:14:1]' # JWT alg: ES512 should generate a valid 
> token
> rspec './spec/jwt_spec.rb[1:13:2]' # JWT alg: ES384 should decode a valid 
> token
> rspec './spec/jwt_spec.rb[1:13:3]' # JWT alg: ES384 wrong key should raise 
> JWT::DecodeError
> rspec './spec/jwt_spec.rb[1:13:1]' # JWT alg: ES384 should generate a valid 
> token
> rspec './spec/jwt_spec.rb[1:13:4]' # JWT alg: ES384 wrong key and verify = 
> false should not raise JWT::DecodeError
> rspec ./spec/jwk/rsa_spec.rb:79 # JWT::JWK::RSA.import when keypair is 
> imported with string keys from JSON returns a hash with the public parts of 
> the key
> rspec ./spec/jwk/rsa_spec.rb:70 # JWT::JWK::RSA.import when keypair is 
> imported with symbol keys returns a hash with the public parts of the key
> rspec ./spec/jwk/rsa_spec.rb:89 # JWT::JWK::RSA.import when private key is 
> included in the data creates a complete keypair
> rspec ./spec/jwk/decode_with_jwk_spec.rb:75 # JWT.decode for JWK usecase when 
> jwk keys are loaded from JSON with string keys decodes the token
> rspec ./spec/jwk/decode_with_jwk_spec.rb:60 # JWT.decode for JWK usecase when 
> jwk keys are loaded using a proc/lambda decodes the token
> rspec ./spec/jwk/decode_with_jwk_spec.rb:13 # JWT.decode for JWK usecase when 
> JWK features are used manually is able to decode the token
> rspec ./spec/jwk/decode_with_jwk_spec.rb:23 # JWT.decode for JWK usecase when 
> jwk keys are given as an array and kid is in the set is able to decode the 
> token
> rspec ./spec/jwk/decode_with_jwk_spec.rb:67 # JWT.decode for JWK usecase when 
> jwk keys are rotated decodes the token
> rspec ./spec/jwk/decode_with_jwk_spec.rb:148 # JWT.decode for JWK usecase 
> mixing algorithms using kid header when HMAC secret is pointed to as EC 
> public key fails in some way
> rspec ./spec/jwk/decode_with_jwk_spec.rb:138 # JWT.decode for JWK usecase 
> mixing algorithms using kid header when HMAC secret is pointed to as RSA 
> public key fails in some way
> rspec ./spec/jwk/decode_with_jwk_spec.rb:158 # JWT.decode for JWK usecase 
> mixing algorithms using kid header when ES384 key is pointed to as ES512 key 
> fails in some way
> rspec ./spec/jwk/decode_with_jwk_spec.rb:128 # JWT.decode for JWK usecase 
> mixing algorithms using kid header when EC key is pointed to as RSA public 
> key fails in some way
> rspec ./spec/jwk/decode_with_jwk_spec.rb:110 # JWT.decode for JWK usecase 
> mixing algorithms using kid header when EC key is pointed to as HMAC secret 
> fails in some way
> rspec ./spec/jwk/decode_with_jwk_spec.rb:92 # JWT.decode for JWK usecase 
> mixing algorithms using kid header when RSA key is pointed to as HMAC secret 
> fails in some way
> 
> Randomized with seed 25919
> 
> Coverage report generated for RSpec to /<<PKGBUILDDIR>>/coverage. 551 / 629 
> LOC (87.6%) covered.
> Stopped processing SimpleCov as a previous error not related to SimpleCov has 
> been detected
> /usr/bin/ruby3.0 
> -I/usr/share/rubygems-integration/all/gems/rspec-support-3.10.3/lib:/usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/lib
>  /usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/exe/rspec 
> --pattern ./spec/\*\*/\*_spec.rb --format documentation failed
> ERROR: Test "ruby3.0" failed: 


The full build log is available from:
http://qa-logs.debian.net/2022/05/25/ruby-jwt_2.3.0-1_unstable.log

All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20220525;users=lu...@debian.org
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20220525&fusertaguser=lu...@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

If you reassign this bug to another package, please marking it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.

--- End Message ---
--- Begin Message ---
Source: ruby-jwt
Source-Version: 2.5.0-1
Done: Cédric Boutillier <bou...@debian.org>

We believe that the bug you reported is fixed in the latest version of
ruby-jwt, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1011...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Cédric Boutillier <bou...@debian.org> (supplier of updated ruby-jwt package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 01 Dec 2022 05:01:50 +0100
Source: ruby-jwt
Architecture: source
Version: 2.5.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Team 
<pkg-ruby-extras-maintain...@lists.alioth.debian.org>
Changed-By: Cédric Boutillier <bou...@debian.org>
Closes: 1011711
Changes:
 ruby-jwt (2.5.0-1) unstable; urgency=medium
 .
   * Team upload
 .
   [ Debian Janitor ]
   * Remove constraints unnecessary since buster:
     + ruby-jwt: Drop versioned constraint on ruby-oauth2 in Breaks.
 .
   [ Cédric Boutillier ]
   * New upstream version 2.5.0
     - Add support for OpenSSL 3.0 (Closes: #1011711)
   * Install README as docs
   * watch file follows tags
   * Drop 0001-Fix-openssl-gem-version-check-to-support-versons-gre.patch
   * Add patch to remove pending tag from passing tests with newer openssl 3.0
   * Bump Standards-Version to 4.6.1 (no changes needed)
Checksums-Sha1:
 dc8993b13189f236859b770fb75721b5f441882a 1449 ruby-jwt_2.5.0-1.dsc
 5f1e734d7b0eaefc319749967053aa9f1fc0bce6 65165 ruby-jwt_2.5.0.orig.tar.gz
 ec7b5c0d02c5013f0c65c229c0367e2cf6198705 4468 ruby-jwt_2.5.0-1.debian.tar.xz
 1fa62de7b23a8aab887810dcddef26d4b71620e2 9517 ruby-jwt_2.5.0-1_amd64.buildinfo
Checksums-Sha256:
 72ef06a2a66097c017dfdfa84083ddd82df62baade0c630381feb419a0b8f1c1 1449 
ruby-jwt_2.5.0-1.dsc
 46afd8644bf6e47089f13d2fbfa88523fad4d81c8f8e4c28df6f2a1c58dfac01 65165 
ruby-jwt_2.5.0.orig.tar.gz
 cc57530d586673e10576fbe9d3dc5ad79bae9a433bc36ff361fb2b4251df6f62 4468 
ruby-jwt_2.5.0-1.debian.tar.xz
 066bcf6ccdd73c923ee4ac103d701ba8a2813b0df7d0c9b8c2eb7e274774fd38 9517 
ruby-jwt_2.5.0-1_amd64.buildinfo
Files:
 176dd15eb5988fc1ab0c215243b25af9 1449 ruby optional ruby-jwt_2.5.0-1.dsc
 b85c64eeb932ce799066234e165114d0 65165 ruby optional ruby-jwt_2.5.0.orig.tar.gz
 950fd4f294200314dc212fbad9e5dacb 4468 ruby optional 
ruby-jwt_2.5.0-1.debian.tar.xz
 bf15330d470c27e027064643abc471d2 9517 ruby optional 
ruby-jwt_2.5.0-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iHUEARYKAB0WIQSEz/3CFSD4gwbsKdFSaZq2P58rwwUCY4goDwAKCRBSaZq2P58r
wyLEAQCsluDZjvNlEcTFoPCwE2DyQm8JVGOJtjKKNdGVWCGVOwD7BtvAfYINqJvR
NA4yesuvRJ27zAlcqvTBeWQheVMDfAU=
=RZWZ
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to