Source: ruby-jwt Version: 2.2.2-1 Severity: serious Justification: FTBFS Tags: bookworm sid ftbfs User: lu...@debian.org Usertags: ftbfs-20220212 ftbfs-bookworm
Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part (hopefully): > Failure/Error: raise JWT::RequiredDependencyError, "You currently have > OpenSSL #{OpenSSL::VERSION}. PS support requires >= 2.1" > > JWT::RequiredDependencyError: > You currently have OpenSSL 3.0.0. PS support requires >= 2.1 > # ./lib/jwt/algos/ps.rb:35:in `require_openssl!' > # ./lib/jwt/algos/ps.rb:11:in `sign' > # ./lib/jwt/signature.rb:37:in `sign' > # ./lib/jwt/encode.rb:57:in `encode_signature' > # ./lib/jwt/encode.rb:34:in `encoded_signature' > # ./lib/jwt/encode.rb:20:in `segments' > # ./lib/jwt.rb:24:in `encode' > # ./spec/jwt_spec.rb:225:in `block (4 levels) in <top (required)>' > > Finished in 0.80869 seconds (files took 0.13885 seconds to load) > 160 examples, 13 failures > > Failed examples: > > rspec ./spec/integration/readme_examples_spec.rb:71 # README.md code test > algorithm usage RSASSA-PSS > rspec './spec/jwt_spec.rb[1:14:2]' # JWT alg: PS256 should decode a valid > token > rspec './spec/jwt_spec.rb[1:14:4]' # JWT alg: PS256 wrong key and verify = > false should not raise JWT::DecodeError > rspec './spec/jwt_spec.rb[1:14:3]' # JWT alg: PS256 wrong key should raise > JWT::DecodeError > rspec './spec/jwt_spec.rb[1:14:1]' # JWT alg: PS256 should generate a valid > token > rspec './spec/jwt_spec.rb[1:15:1]' # JWT alg: PS384 should generate a valid > token > rspec './spec/jwt_spec.rb[1:15:4]' # JWT alg: PS384 wrong key and verify = > false should not raise JWT::DecodeError > rspec './spec/jwt_spec.rb[1:15:2]' # JWT alg: PS384 should decode a valid > token > rspec './spec/jwt_spec.rb[1:15:3]' # JWT alg: PS384 wrong key should raise > JWT::DecodeError > rspec './spec/jwt_spec.rb[1:16:2]' # JWT alg: PS512 should decode a valid > token > rspec './spec/jwt_spec.rb[1:16:3]' # JWT alg: PS512 wrong key should raise > JWT::DecodeError > rspec './spec/jwt_spec.rb[1:16:1]' # JWT alg: PS512 should generate a valid > token > rspec './spec/jwt_spec.rb[1:16:4]' # JWT alg: PS512 wrong key and verify = > false should not raise JWT::DecodeError > > Randomized with seed 63633 > > /usr/bin/ruby3.0 > -I/usr/share/rubygems-integration/all/gems/rspec-support-3.10.3/lib:/usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/lib > /usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/exe/rspec > --pattern ./spec/\*\*/\*_spec.rb failed > ERROR: Test "ruby3.0" failed: The full build log is available from: http://qa-logs.debian.net/2022/02/12/ruby-jwt_2.2.2-1_unstable.log A list of current common problems and possible solutions is available at http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute! If you reassign this bug to another package, please marking it as 'affects'-ing this package. See https://www.debian.org/Bugs/server-control#affects If you fail to reproduce this, please provide a build log and diff it with mine so that we can identify if something relevant changed in the meantime.