Source: node-http-signature Version: 1.3.6-1 Severity: serious Justification: FTBFS Tags: bookworm sid ftbfs User: lu...@debian.org Usertags: ftbfs-20220412 ftbfs-bookworm
Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part (hopefully): > debian/rules binary > dh binary > dh_update_autotools_config > dh_autoreconf > dh_auto_configure --buildsystem=nodejs > dh_auto_build --buildsystem=nodejs > No build command found, searching known files > dh_auto_test --buildsystem=nodejs > mkdir -p node_modules > ln -s ../. node_modules/http-signature > /bin/sh -ex debian/tests/pkg-js/test > + set -e > + set -x > + mkdir -p node_modules > + nodepath uuid > + ln -s /usr/share/nodejs/uuid node_modules/uuid > + + ls -1 test/convert.test.js test/examples.test.js test/header.test.js > test/parser.test.js test/signer.test.js test/verify.test.js > + grep -v examples.test.jsxargs tap > > TAP version 13 > (node:3386692) DeprecationWarning: strictEqual() is deprecated, use equal() > instead > (Use `node --trace-deprecation ...` to show where the warning was created) > (node:3386690) DeprecationWarning: similar() is deprecated, use match() > instead > (Use `node --trace-deprecation ...` to show where the warning was created) > ok 1 - test/convert.test.js # time=54.359ms { > # Subtest: 1024b pem to rsa ssh key > ok 1 - should be equal > 1..1 > ok 1 - 1024b pem to rsa ssh key # time=11.31ms > > # Subtest: 2048b pem to rsa ssh key > ok 1 - should be equal > 1..1 > ok 2 - 2048b pem to rsa ssh key # time=1.899ms > > # Subtest: 4096b pem to rsa ssh key > ok 1 - should be equal > 1..1 > ok 3 - 4096b pem to rsa ssh key # time=1.317ms > > # Subtest: 1024b rsa ssh key > ok 1 - should be equal > 1..1 > ok 4 - 1024b rsa ssh key # time=4.391ms > > # Subtest: 2048b rsa ssh key > ok 1 - should be equal > 1..1 > ok 5 - 2048b rsa ssh key # time=1.725ms > > # Subtest: 4096b rsa ssh key > ok 1 - should be equal > 1..1 > ok 6 - 4096b rsa ssh key # time=1.259ms > > # Subtest: 1024b dsa ssh key > ok 1 - should be equal > 1..1 > ok 7 - 1024b dsa ssh key # time=1.372ms > > # Subtest: fingerprint > ok 1 - should be equal > 1..1 > ok 8 - fingerprint # time=1.812ms > > 1..8 > # time=54.359ms > } > > ok 2 - test/header.test.js # time=57.763ms { > # Subtest: setup > ok 1 - expect truthy value > 1..1 > ok 1 - setup # time=24.26ms > > # Subtest: header with 0 value > ok 1 - expect truthy value > ok 2 - expect truthy value > > Signature keyId="unit",algorithm="rsa-sha256",headers="date > request-line > content-length",signature="NRctKcjZL6WMsVFt9743vikccJbov/yc81S+PT0tORXManGTceNIQs2HxCil0h2ZcI8KLU3Q712GAUA23J5U2wTcoVfiPM/u9DTR9Up2lwlYVb5XrhGv62cRL9PUtEezcilB2sbYAUaancgTiJiFTKqqaaKwO6Z/cBR2/60miMo=" > 1..2 > ok 2 - header with 0 value # time=21.622ms > > # Subtest: header with boolean-mungable value > ok 1 - expect truthy value > ok 2 - expect truthy value > > Signature keyId="unit",algorithm="rsa-sha256",headers="date > x-foo",signature="qx1pW4xEuEIzmctlcxoUH8f1Q0xsqUNYv6NHOJKvbMIuuTe7m211s9IRDS5p+NBh5YcTTLIuOSyAmCUGFL29e+WZpFZ1FXvOoIeDSf7B95xYZ+nWAMRaV+rJnoyJumnH0mlTUO637UWw8VyCGqYuUtN5T3rqkZHNIZL85lTcAKA=" > 1..2 > ok 3 - header with boolean-mungable value # time=5.466ms > > # Subtest: tear down > 1..0 > ok 4 - tear down # time=0.988ms > > 1..4 > # time=57.763ms > } > > (node:3386693) [DEP0005] DeprecationWarning: Buffer() is deprecated due to > security and usability issues. Please use the Buffer.alloc(), > Buffer.allocUnsafe(), or Buffer.from() methods instead. > (Use `node --trace-deprecation ...` to show where the warning was created) > ok 3 - test/parser.test.js # time=1385.694ms { > # Subtest: setup > 1..0 > ok 1 - setup # time=55.947ms > > # Subtest: no authorization > ok 1 - should be equal > ok 2 - should be equal > 1..2 > ok 2 - no authorization # time=14.118ms > > # Subtest: bad scheme > ok 1 - should be equal > ok 2 - should be equal > ok 3 - should be equal > 1..3 > ok 3 - bad scheme # time=4.425ms > > # Subtest: no key id > ok 1 - should be equal > ok 2 - should be equal > ok 3 - should be equal > 1..3 > ok 4 - no key id # time=2.807ms > > # Subtest: key id no value > ok 1 - should be equal > ok 2 - should be equal > ok 3 - should be equal > 1..3 > ok 5 - key id no value # time=2.451ms > > # Subtest: key id no quotes > ok 1 - should be equal > ok 2 - should be equal > ok 3 - should be equal > 1..3 > ok 6 - key id no quotes # time=2.438ms > > # Subtest: key id param quotes > ok 1 - should be equal > ok 2 - should be equal > ok 3 - should be equal > 1..3 > ok 7 - key id param quotes # time=2.137ms > > # Subtest: param name with space > ok 1 - should be equal > ok 2 - should be equal > ok 3 - should be equal > 1..3 > ok 8 - param name with space # time=2.233ms > > # Subtest: no algorithm > ok 1 - should be equal > ok 2 - should be equal > ok 3 - should be equal > 1..3 > ok 9 - no algorithm # time=2.142ms > > # Subtest: algorithm no value > ok 1 - should be equal > ok 2 - should be equal > ok 3 - should be equal > 1..3 > ok 10 - algorithm no value # time=2.155ms > > # Subtest: no signature > ok 1 - should be equal > ok 2 - should be equal > ok 3 - should be equal > 1..3 > ok 11 - no signature # time=2.024ms > > # Subtest: invalid algorithm > ok 1 - should be equal > ok 2 - should be equal > ok 3 - should be equal > 1..3 > ok 12 - invalid algorithm # time=5.781ms > > # Subtest: no date header > ok 1 - should be equal > ok 2 - should be equal > ok 3 - should be equal > 1..3 > ok 13 - no date header # time=3.105ms > > # Subtest: valid numeric parameter > ok 1 - should be equal > 1..1 > ok 14 - valid numeric parameter # time=3.4ms > > # Subtest: invalid numeric parameter > ok 1 - should be equal > ok 2 - should be equal > ok 3 - should be equal > 1..3 > ok 15 - invalid numeric parameter # time=3.013ms > > # Subtest: invalid numeric parameter - decimal > ok 1 - should be equal > ok 2 - should be equal > ok 3 - should be equal > 1..3 > ok 16 - invalid numeric parameter - decimal # time=3.336ms > > # Subtest: invalid numeric parameter - signed integer > ok 1 - should be equal > ok 2 - should be equal > ok 3 - should be equal > 1..3 > ok 17 - invalid numeric parameter - signed integer # time=3.013ms > > # Subtest: created in future > ok 1 - should be equal > ok 2 - should match pattern provided > ok 3 - should be equal > 1..3 > ok 18 - created in future # time=6.322ms > > # Subtest: expires expired > ok 1 - should be equal > ok 2 - should match pattern provided > ok 3 - should be equal > 1..3 > ok 19 - expires expired # time=2.686ms > > # Subtest: valid created and expires with skew > ok 1 - should be equal > 1..1 > ok 20 - valid created and expires with skew # time=1.91ms > > # Subtest: valid default headers > ok 1 - should be equal > 1..1 > ok 21 - valid default headers # time=2.327ms > > # Subtest: valid custom authorizationHeaderName > ok 1 - should be equal > 1..1 > ok 22 - valid custom authorizationHeaderName # time=1.778ms > > # Subtest: explicit headers missing > ok 1 - should be equal > 1..1 > ok 23 - explicit headers missing # time=1.697ms > > # Subtest: valid explicit headers request-line > ok 1 - should be equal > { > "scheme": "Signature", > "params": { > }, > "signingString": "date: Tue, 12 Apr 2022 16:45:59 GMT\ndigest: > a37fc744-0e9a-4c72-a660-5bbd4fcb14b5\nGET / HTTP/1.1", > "algorithm": "RSA-SHA256", > "keyId": "fo,o" > } > "keyId": "fo,o", > "algorithm": "rsa-sha256", > "headers": [ > "date", > "digest", > "request-line" > ], > "extensions": "blah blah", > "signature": "digitalSignature" > ok 2 - expect truthy value > ok 3 - should be equal > ok 4 - expect truthy value > ok 5 - should be equal > ok 6 - should be equal > ok 7 - should be equal > ok 8 - expect truthy value > ok 9 - should be equal > ok 10 - should be equal > ok 11 - should be equal > ok 12 - should be equal > ok 13 - should be equal > ok 14 - expect truthy value > ok 15 - should be equal > ok 16 - should be equal > ok 17 - should be equal > 1..17 > ok 24 - valid explicit headers request-line # time=4.876ms > > # Subtest: valid explicit headers request-line strict true > ok 1 - should be equal > ok 2 - should be equal > ok 3 - should be equal > 1..3 > ok 25 - valid explicit headers request-line strict true # time=2.412ms > > # Subtest: valid explicit headers request-target > ok 1 - should be equal > { > "scheme": "Signature", > "params": { > }, > "signingString": "date: Tue, 12 Apr 2022 16:45:59 GMT\ndigest: > 27399012-23e6-45c0-b147-466332b71d4c\n(request-target): get /", > "algorithm": "RSA-SHA256", > "keyId": "fo,o" > } > "keyId": "fo,o", > "algorithm": "rsa-sha256", > "headers": [ > "date", > "digest", > "(request-target)" > ], > "extensions": "blah blah", > "signature": "digitalSignature" > ok 2 - expect truthy value > ok 3 - should be equal > ok 4 - expect truthy value > ok 5 - should be equal > ok 6 - should be equal > ok 7 - should be equal > ok 8 - expect truthy value > ok 9 - should be equal > ok 10 - should be equal > ok 11 - should be equal > ok 12 - should be equal > ok 13 - should be equal > ok 14 - expect truthy value > ok 15 - should be equal > ok 16 - should be equal > ok 17 - should be equal > 1..17 > ok 26 - valid explicit headers request-target # time=5.876ms > > # Subtest: expired > ok 1 - should be equal > 1..1 > ok 27 - expired # time=1210.667ms > > # Subtest: missing required header > ok 1 - should be equal > ok 2 - should be equal > ok 3 - should be equal > 1..3 > ok 28 - missing required header # time=7.159ms > > # Subtest: valid mixed case headers > ok 1 - should be equal > 1..1 > ok 29 - valid mixed case headers # time=2.99ms > > # Subtest: not whitelisted algorithm > ok 1 - should be equal > ok 2 - should be equal > ok 3 - should be equal > 1..3 > ok 30 - not whitelisted algorithm # time=3.313ms > > # Subtest: tearDown > 1..0 > ok 31 - tearDown # time=1.106ms > > 1..31 > # time=1385.694ms > } > > ok 4 - test/signer.test.js # time=179.941ms { > # Subtest: setup > ok 1 - expect truthy value > ok 2 - expect truthy value > ok 3 - expect truthy value > ok 4 - expect truthy value > 1..4 > ok 1 - setup # time=34.521ms > > # Subtest: defaults > ok 1 - expect truthy value > ok 2 - expect truthy value > ok 3 - should be equal > ok 4 - expect truthy value > ok 5 - expect truthy value > > Signature > keyId="unitTest",algorithm="rsa-sha256",signature="VA4j7tIyy86iUX88YfK8utPgFWDpnDwuP/B5+QCj2+nCMVJbMKQaE4TqAnguU6Fnj4PcM2ZheePetcIMk7zaqx/XZ2fPiixYei0r3tmrkqTwcfxe1Dv4fZclx8x9aGyb7JPV9YboYDxaY4q152UjYLiWj+/Biev2jfBj3mFyhxQ=" > 1..5 > ok 2 - defaults # time=36.755ms > > # Subtest: with custom authorizationHeaderName > ok 1 - expect truthy value > ok 2 - expect truthy value > ok 3 - should be equal > ok 4 - expect truthy value > ok 5 - expect truthy value > > Signature > keyId="unitTest",algorithm="rsa-sha256",signature="VA4j7tIyy86iUX88YfK8utPgFWDpnDwuP/B5+QCj2+nCMVJbMKQaE4TqAnguU6Fnj4PcM2ZheePetcIMk7zaqx/XZ2fPiixYei0r3tmrkqTwcfxe1Dv4fZclx8x9aGyb7JPV9YboYDxaY4q152UjYLiWj+/Biev2jfBj3mFyhxQ=" > 1..5 > ok 3 - with custom authorizationHeaderName # time=6.09ms > > # Subtest: request line strict unspecified > ok 1 - expect truthy value > ok 2 - expect truthy value > ok 3 - should be equal > ok 4 - expect truthy value > > Signature keyId="unit",algorithm="rsa-sha256",headers="date > request-line",signature="eYBWX7Rhh0xpM4GwTNyBurzuXrbot9GMXkKSKsyot5RopcPVYZFpD3mv2LyRRgDgKiVkjR7tjQjezgHdzB35T1f7GFScVmWYYKRf2Cn7r5XgFRMnKpVn2FfH3qtHWBlT9tRF1OyKqxd31rfIsIfxlEh/Xf4MGiD7nHV4RXAjNAY=" > 1..4 > ok 4 - request line strict unspecified # time=3.45ms > > # Subtest: request line strict false > ok 1 - expect truthy value > ok 2 - expect truthy value > ok 3 - expect truthy value > ok 4 - expect truthy value > > Signature keyId="unit",algorithm="rsa-sha256",headers="date > request-line",signature="eYBWX7Rhh0xpM4GwTNyBurzuXrbot9GMXkKSKsyot5RopcPVYZFpD3mv2LyRRgDgKiVkjR7tjQjezgHdzB35T1f7GFScVmWYYKRf2Cn7r5XgFRMnKpVn2FfH3qtHWBlT9tRF1OyKqxd31rfIsIfxlEh/Xf4MGiD7nHV4RXAjNAY=" > 1..4 > ok 5 - request line strict false # time=3.233ms > > # Subtest: request line strict true > ok 1 - expected to throw > 1..1 > ok 6 - request line strict true # time=2.71ms > > # Subtest: request target > ok 1 - expect truthy value > ok 2 - expect truthy value > ok 3 - should be equal > ok 4 - expect truthy value > > Signature keyId="unit",algorithm="rsa-sha256",headers="date > (request-target)",signature="IHR8HPwxmjeKpSkESDHHJw4THi38hB9kXzRdedCIdXIEXyJjvM6sC2d4XJfJ22orV3XYfe1748fRrMmrtpHJ3UZ5DD/54MNKs8R4HylTd0o4qywiUDZKGNyvE1s2D6Aa+DR18dXZdJRUVIIdt74euwisXgmWeQ0SjCSniExLHLA=" > 1..4 > ok 7 - request target # time=3.062ms > > # Subtest: keyid > ok 1 - expect truthy value > ok 2 - expect truthy value > ok 3 - should be equal > ok 4 - expect truthy value > > Signature keyId="unit",algorithm="rsa-sha256",headers="date > (keyid)",signature="O4fxxHfYzP+JdMf+9Uvhx7I55mH4R7ygRN67QxCabRE+xJZOfk/BSeVVDzmdSuHaCSYfnyBA6QQ+jO1elb6XjVjsX9iXA/X6wWubcFct5PrOhUrOZRDsBD3s39BFJTZe40Rr6b8Fa/2CkRiupbR3Q+EiOZBeBMHgkfw/0syrwWY=" > 1..4 > ok 8 - keyid # time=5.865ms > > # Subtest: signing algorithm > ok 1 - expect truthy value > ok 2 - expect truthy value > ok 3 - should be equal > ok 4 - should be equal > ok 5 - should be equal > ok 6 - expect truthy value > > Signature keyId="unit",algorithm="rsa-sha256",headers="date > (algorithm)",signature="KlzRtJmzdVrKdY2mJt9KqdopVe3EFslxyOeS+b9Dy/N6RIC8Xt1+BC2x4BMT2yTdscuo8tHEcT+ZzCKg2P3uTgPwc6+gTggqT+51+XqRe7FsbiVBzv6WQ4zlsCBjbvJKizgeFal5+K+9Ovvl/R21s9mFDNNbbsWcV1/+PM4tIrA=" > 1..6 > ok 9 - signing algorithm # time=5.186ms > > # Subtest: signing with unspecified algorithm > ok 1 - expect truthy value > ok 2 - expect truthy value > ok 3 - should be equal > ok 4 - should be equal > ok 5 - expect truthy value > > Signature keyId="unit",algorithm="rsa-sha256",headers="date > (algorithm)",signature="KlzRtJmzdVrKdY2mJt9KqdopVe3EFslxyOeS+b9Dy/N6RIC8Xt1+BC2x4BMT2yTdscuo8tHEcT+ZzCKg2P3uTgPwc6+gTggqT+51+XqRe7FsbiVBzv6WQ4zlsCBjbvJKizgeFal5+K+9Ovvl/R21s9mFDNNbbsWcV1/+PM4tIrA=" > 1..5 > ok 10 - signing with unspecified algorithm # time=4.703ms > > # Subtest: signing opaque param > ok 1 - expect truthy value > ok 2 - expect truthy value > ok 3 - should be equal > ok 4 - should be equal > ok 5 - expect truthy value > > Signature > keyId="unit",algorithm="rsa-sha256",opaque="opaque",headers="date > (opaque)",signature="NU5Hye5p+VJs+fVSphcfRMaNX7NzH1S++eM0fl81+Gj96bk3qjYhGbS4Dm8iEvlJ9tSg6s4hQzdiFA9pYysYt90mNIAYsapbGx/vSrmqctBNYDUbwFGnqLPGNzZz2nCxJ6UGpvg7QLvGNYJVGPVMOu8NfAoS1enolp5ZgSQsh3Y=" > 1..5 > ok 11 - signing opaque param # time=3.784ms > > # Subtest: signing with key protected with passphrase > ok 1 - expect truthy value > ok 2 - expect truthy value > ok 3 - should be equal > ok 4 - should be equal > ok 5 - expect truthy value > > Signature keyId="unit",algorithm="rsa-sha256",headers="date > (algorithm)",signature="D4M8vJ1MO/rovjNpaavF7oqq3A5Ij6FsKpipktpgbG8sd8p31hfjpC8KcOrhPIRSPmAWaWVcKut2oPWDinOP5HNyr7ecH7iKARjF3n6VSglBBRTghAdA8ZMsxPoUmT1DxFNjqdMaltpACvHMbUrhhVvfwM7pizdvfB191HXpPvc=" > 1..5 > ok 12 - signing with key protected with passphrase # time=23.484ms > > # Subtest: request-target with dsa key > ok 1 - expect truthy value > ok 2 - expect truthy value > > Signature keyId="unit",algorithm="dsa-sha1",headers="date > (request-target)",signature="MC0CFQCRavKIky29gtgKvY4PIaOODxr3CwIUMZgM9MUc/Iah1Iq1M3PhaasHm70=" > 1..2 > ok 13 - request-target with dsa key # time=3.086ms > > # Subtest: request-target with ecdsa key > ok 1 - expect truthy value > ok 2 - expect truthy value > > Signature keyId="unit",algorithm="ecdsa-sha256",headers="date > (request-target)",signature="MEUCIQDLw5IevWyMt2BPKbWRbE6BATJB9klREzOzRiSN2mG9hAIgL1IGBR+Ode0L00/udQbZFXeJKzdwsDkiPx9+of27fyE=" > 1..2 > ok 14 - request-target with ecdsa key # time=3.203ms > > # Subtest: hmac > ok 1 - expect truthy value > ok 2 - expect truthy value > > Signature > keyId="unit",algorithm="hmac-sha1",signature="1IBR42MK7/IXJGqsdf0mT3R9JLQ=" > 1..2 > ok 15 - hmac # time=1.936ms > > # Subtest: createSigner with RSA key > ok 1 - should not error > > Signature keyId="foo",algorithm="rsa-sha1",headers="(request-target) > date",signature="XosDwHJYgyUJK5Q5TOqP7xOUF2CEvlp9PGPCdeyJmRELr4/sE+uVyvrMHkqDvK7LnJinloE/43uB1WWmBNfOM2jhbmRkdsrivZsyENiRVkuy9sae23thmm7wunyovKtSIninm8yhUrmxqavdV57n5CrZaQBqTeQxUCroA6NTUe8=" > 1..1 > ok 16 - createSigner with RSA key # time=3.419ms > > # Subtest: createSigner with RSA key, auto algo > ok 1 - should not error > 1..1 > ok 17 - createSigner with RSA key, auto algo # time=2.526ms > > # Subtest: createSigner with RSA key, auto algo, passphrase > ok 1 - should not error > 1..1 > ok 18 - createSigner with RSA key, auto algo, passphrase # time=18.448ms > > # Subtest: createSigner with HMAC key > ok 1 - should not error > 1..1 > ok 19 - createSigner with HMAC key # time=2.143ms > > # Subtest: createSigner with sign function > ok 1 - expect truthy value > ok 2 - expect truthy value > ok 3 - should be equal > ok 4 - should not error > ok 5 - expect truthy value > 1..5 > ok 20 - createSigner with sign function # time=2.512ms > > # Subtest: tear down > 1..0 > ok 21 - tear down # time=0.9ms > > 1..21 > # time=179.941ms > } > > ok 5 - test/verify.test.js # time=162.933ms { > # Subtest: setup > ok 1 - expect truthy value > ok 2 - expect truthy value > ok 3 - expect truthy value > ok 4 - expect truthy value > ok 5 - expect truthy value > ok 6 - expect truthy value > 1..6 > ok 1 - setup # time=77.921ms > > # Subtest: invalid hmac > ok 1 - expect truthy value > ok 2 - should be equal > 1..2 > ok 2 - invalid hmac # time=20.206ms > > # Subtest: valid hmac > ok 1 - expect truthy value > ok 2 - should be equal > 1..2 > ok 3 - valid hmac # time=4.537ms > > # Subtest: invalid raw hmac > ok 1 - expect truthy value > ok 2 - should be equal > 1..2 > ok 4 - invalid raw hmac # time=2.759ms > > # Subtest: valid raw hmac > ok 1 - expect truthy value > ok 2 - should be equal > 1..2 > ok 5 - valid raw hmac # time=2.677ms > > # Subtest: invalid rsa > ok 1 - expect truthy value > ok 2 - should be equal > 1..2 > ok 6 - invalid rsa # time=7.013ms > > # Subtest: valid rsa > ok 1 - expect truthy value > ok 2 - should be equal > 1..2 > ok 7 - valid rsa # time=4.177ms > > # Subtest: invalid dsa > ok 1 - expect truthy value > ok 2 - should be equal > 1..2 > ok 8 - invalid dsa # time=3.081ms > > # Subtest: valid dsa > ok 1 - expect truthy value > ok 2 - should be equal > 1..2 > ok 9 - valid dsa # time=4.951ms > > # Subtest: invalid ecdsa > ok 1 - expect truthy value > ok 2 - should be equal > 1..2 > ok 10 - invalid ecdsa # time=3.347ms > > # Subtest: valid ecdsa > ok 1 - expect truthy value > ok 2 - should be equal > 1..2 > ok 11 - valid ecdsa # time=3.475ms > > # Subtest: invalid date > ok 1 - expected to throw > ok 2 - should be equal > 1..2 > ok 12 - invalid date # time=3.307ms > > # Subtest: valid rsa from spec default > ok 1 - expect truthy value > ok 2 - expect truthy value > ok 3 - should be equal > 1..3 > ok 13 - valid rsa from spec default # time=3.347ms > > # Subtest: valid rsa from spec default > ok 1 - expect truthy value > ok 2 - expect truthy value > ok 3 - should be equal > 1..3 > ok 14 - valid rsa from spec default # time=3.915ms > > # Subtest: valid rsa from spec all headers > ok 1 - expect truthy value > ok 2 - expect truthy value > ok 3 - should be equal > 1..3 > ok 15 - valid rsa from spec all headers # time=3.536ms > > # Subtest: valid rsa from spec all headers (request-target) > ok 1 - expect truthy value > ok 2 - expect truthy value > ok 3 - should be equal > 1..3 > ok 16 - valid rsa from spec all headers (request-target) # time=3.321ms > > # Subtest: tear down > 1..0 > ok 17 - tear down # time=0.81ms > > 1..17 > # time=162.933ms > } > > 1..5 > # time=3161.751ms > ERROR: Coverage for lines (88.81%) does not meet global threshold (100%) > ERROR: Coverage for functions (93.1%) does not meet global threshold (100%) > ERROR: Coverage for branches (77.86%) does not meet global threshold (100%) > ERROR: Coverage for statements (88.86%) does not meet global threshold (100%) > -----------|---------|----------|---------|---------|----------------------------------------------- > File | % Stmts | % Branch | % Funcs | % Lines | Uncovered Line #s > > -----------|---------|----------|---------|---------|----------------------------------------------- > All files | 88.86 | 77.86 | 93.1 | 88.81 | > > index.js | 100 | 100 | 100 | 100 | > > parser.js | 92.07 | 85.59 | 100 | 92.02 | > 172,223,228,233,240,269,295,297,299-304,325 > signer.js | 85.32 | 72.8 | 85.71 | 85.25 | > ...49,360,367,387,416,420-422,424-430,434,458 > utils.js | 93.75 | 66.66 | 100 | 93.75 | 47,52 > > verify.js | 89.74 | 66.66 | 100 | 89.74 | 35,58,81,84 > > -----------|---------|----------|---------|---------|----------------------------------------------- > dh_auto_test: error: /bin/sh -ex debian/tests/pkg-js/test returned exit code > 123 The full build log is available from: http://qa-logs.debian.net/2022/04/12/node-http-signature_1.3.6-1_unstable.log All bugs filed during this archive rebuild are listed at: https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20220412;users=lu...@debian.org or: https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20220412&fusertaguser=lu...@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! If you reassign this bug to another package, please marking it as 'affects'-ing this package. See https://www.debian.org/Bugs/server-control#affects If you fail to reproduce this, please provide a build log and diff it with mine so that we can identify if something relevant changed in the meantime. -- Pkg-javascript-devel mailing list Pkg-javascript-devel@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-javascript-devel