Your message dated Wed, 02 Sep 2015 15:55:20 +0000
with message-id <e1zxanc-0003cx...@franck.debian.org>
and subject line Bug#794259: fixed in ruby-jwt 1.0.0-3
has caused the Debian Bug report #794259,
regarding FTBFS: "JWT secure comparison returns true if strings are equal" fails
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
794259: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794259
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ruby-jwt
Version: 1.0.0-2
Severity: serious
Tags: sid
Justification: fails to build from source
User: reproducible-bui...@lists.alioth.debian.org
Usertags: ftbfs
Dear Maintainer,
The package fails to build:
/usr/bin/ruby2.1 /usr/bin/rspec --pattern ./spec/\*\*/\*_spec.rb
...................FFF..
Failures:
1) JWT secure comparison returns true if strings are equal
Failure/Error: expect(JWT.secure_compare("Foo", "Foo")).to be_true
expected true to respond to `true?` or perhaps you meant `be true` or
`be_truthy`
# ./spec/jwt_spec.rb:127:in `block (3 levels) in <top (required)>'
2) JWT secure comparison returns false if either input is nil or empty
Failure/Error: expect(JWT.secure_compare(bad, "Foo")).to be_false
expected false to respond to `false?` or perhaps you meant `be false` or
`be_falsey`
# ./spec/jwt_spec.rb:132:in `block (4 levels) in <top (required)>'
# ./spec/jwt_spec.rb:131:in `each'
# ./spec/jwt_spec.rb:131:in `block (3 levels) in <top (required)>'
3) JWT secure comparison retuns false if the strings are different
Failure/Error: expect(JWT.secure_compare("Foo", "Bar")).to be_false
expected false to respond to `false?` or perhaps you meant `be false` or
`be_falsey`
# ./spec/jwt_spec.rb:138:in `block (3 levels) in <top (required)>'
Finished in 0.34342 seconds (files took 1.12 seconds to load)
23 examples, 3 failures
Full build log:
https://reproducible.debian.net/rb-pkg/unstable/amd64/ruby-jwt.html
-- System Information:
Debian Release: stretch/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 3.19.0-23-generic (SMP w/8 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
--- End Message ---
--- Begin Message ---
Source: ruby-jwt
Source-Version: 1.0.0-3
We believe that the bug you reported is fixed in the latest version of
ruby-jwt, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 794...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Balasankar C <balasank...@autistici.org> (supplier of updated ruby-jwt package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Wed, 02 Sep 2015 18:18:57 +0530
Source: ruby-jwt
Binary: ruby-jwt
Architecture: source all
Version: 1.0.0-3
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers
<pkg-ruby-extras-maintain...@lists.alioth.debian.org>
Changed-By: Balasankar C <balasank...@autistici.org>
Description:
ruby-jwt - JSON Web Token implementation in Ruby
Closes: 794259
Changes:
ruby-jwt (1.0.0-3) unstable; urgency=medium
.
* Team upload.
* Port tests to RSpec3 (Closes: #794259)
Checksums-Sha1:
74da660353afae1b3ab163268b9e464b65c525d4 2048 ruby-jwt_1.0.0-3.dsc
007808bf38a6c4f086aa6367da56252699ac3b1d 2920 ruby-jwt_1.0.0-3.debian.tar.xz
822dc940ccb71df6b6b190362272a1f2b2477db8 4818 ruby-jwt_1.0.0-3_all.deb
Checksums-Sha256:
9cbc21278542c627899c1d3357568668d4b842df3d17f6af633292f22d9ab26f 2048
ruby-jwt_1.0.0-3.dsc
c28e163f280c4abb17cf67c5918966022b93185e392e7b4143b52b7dac3a6545 2920
ruby-jwt_1.0.0-3.debian.tar.xz
53c660d2dc211146bb3e3f2f0f755c24741cc1eaf9f6c099241b293ba8bb9ce8 4818
ruby-jwt_1.0.0-3_all.deb
Files:
55b15738a158eb92835fc92ee2ad90b3 2048 ruby optional ruby-jwt_1.0.0-3.dsc
304b67e0c306c6a59ab9da5b4159b894 2920 ruby optional
ruby-jwt_1.0.0-3.debian.tar.xz
4dcccf3ec9e987ac5217517174788762 4818 ruby optional ruby-jwt_1.0.0-3_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIcBAEBCAAGBQJV5xV5AAoJEM4fnGdFEsIqJqEP/i9lVF5Qh9O4d1jlBtZJaUEh
KbcwohXLbrDgVP7UIrsaj/X4oMiiJ9Y1WCJAG4GQr/pT4aeIug+A3WtdAXkJvvIu
FiUwB9ZEI4whC5XAIsr/7b9exrgzsjnoFiouCu0xCX1HSk9WRF3WlkcddcZ6WnE7
XUQsOyvQdG4usPguz2F1yjLj1+DljNJdrNPug0gSYRkIRge2pOMKQJwYA61WP4wb
P2TQITwWu1j4HTgNJxB4DZj59cgyg4DQBeIg8f346ozuhMlf8NC3/RUWSqSoqMAO
Fk1H5zxRM/oJIW9k/Qtt7j8P+t9W+DuCX/xh4pPpSJ/nE7Ef5VYQSnDgUqcasj4o
IU4N6ElHLvbufFCNV1mMybJSenGp7H9ZQb+CiwgraWXGx9FXM9BIIiR4DGysL288
UjltkYJGxXUAD5a2XnCituYgZoNilJN83wmQSqXsRMCy0wgtzZ519Db37XTCrroB
0dV0D3S+zbKoXx0yB6U0uIr1f+bDs2v2JqrgH5ZABj5YWLsuDm24rx50cr2fZD67
ucj4YjPDDyUh+INPA52KqbtGsvbQK3sy74ap9/PvLpPjIAuKIo0TrhNVqsAD8mVH
CvH9yIju+sZtH7owz9PN+Mf6k0PWeDYueBpR1sYxB3dUpwE6fFh+drzeoqn/7Pgy
QrI9Afr59uIph9O7qBi7
=GuIM
-----END PGP SIGNATURE-----
--- End Message ---