Your message dated Sat, 17 Sep 2022 11:35:48 +0000
with message-id <e1ozw6u-007x3h...@fasolo.debian.org>
and subject line Bug#1011682: fixed in ruby-json-jwt 1.14.0-2
has caused the Debian Bug report #1011682,
regarding ruby-json-jwt: FTBFS: ERROR: Test "ruby3.0" failed: Failure/Error: 
key.set_key n, e, d
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1011682: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011682
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ruby-json-jwt
Version: 1.13.0-1
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-20220525 ftbfs-bookworm

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.


Relevant part (hopefully):
>        Failure/Error: key.set_key n, e, d
> 
>        OpenSSL::PKey::PKeyError:
>          rsa#set_key= is incompatible with OpenSSL 3.0
>        # ./lib/json/jwk.rb:106:in `set_key'
>        # ./lib/json/jwk.rb:106:in `to_rsa_key'
>        # ./lib/json/jwk.rb:43:in `to_key'
>        # ./lib/json/jose.rb:27:in `with_jwk_support'
>        # ./lib/json/jws.rb:100:in `sign'
>        # ./lib/json/jws.rb:17:in `sign!'
>        # ./lib/json/jwt.rb:35:in `sign'
>        # ./spec/json/jwt_spec.rb:130:in `block (4 levels) in <top (required)>'
> 
> Finished in 0.7193 seconds (files took 0.45001 seconds to load)
> 380 examples, 117 failures, 6 pending
> 
> Failed examples:
> 
> rspec ./spec/interop/with_jsrsasign_spec.rb:41 # interop with jsrsasign JWS 
> verify should succeed
> rspec ./spec/json/jwk_spec.rb:105 # JSON::JWK when RSA public key given 
> #to_key 
> rspec ./spec/json/jwk_spec.rb:139 # JSON::JWK when EC public key given 
> unknown curve 
> rspec ./spec/json/jwk_spec.rb:160 # JSON::JWK when EC public key given 
> #to_key 
> rspec ./spec/json/jwk_spec.rb:187 # JSON::JWK unknown key type 
> rspec './spec/json/jws_spec.rb[1:4:4:2:1:1]' # JSON::JWS#sign! RS256 when 
> JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:4:2:1:2:1]' # JSON::JWS#sign! RS256 when 
> JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:4:2:2:1]' # JSON::JWS#sign! RS256 when 
> JSON::JWK key given behaves like generate_expected_signature 
> rspec './spec/json/jws_spec.rb[1:4:4:2:2:2:1]' # JSON::JWS#sign! RS256 when 
> JSON::JWK key given behaves like generate_expected_signature with blank 
> payload 
> rspec './spec/json/jws_spec.rb[1:4:5:2:1:1]' # JSON::JWS#sign! RS384 when 
> JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:5:2:1:2:1]' # JSON::JWS#sign! RS384 when 
> JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:5:2:2:1]' # JSON::JWS#sign! RS384 when 
> JSON::JWK key given behaves like generate_expected_signature 
> rspec './spec/json/jws_spec.rb[1:4:5:2:2:2:1]' # JSON::JWS#sign! RS384 when 
> JSON::JWK key given behaves like generate_expected_signature with blank 
> payload 
> rspec './spec/json/jws_spec.rb[1:4:6:2:1:1]' # JSON::JWS#sign! RS512 when 
> JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:6:2:1:2:1]' # JSON::JWS#sign! RS512 when 
> JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:6:2:2:1]' # JSON::JWS#sign! RS512 when 
> JSON::JWK key given behaves like generate_expected_signature 
> rspec './spec/json/jws_spec.rb[1:4:6:2:2:2:1]' # JSON::JWS#sign! RS512 when 
> JSON::JWK key given behaves like generate_expected_signature with blank 
> payload 
> rspec './spec/json/jws_spec.rb[1:4:7:1:1:1]' # JSON::JWS#sign! ES256 when 
> OpenSSL::PKey::EC key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:7:1:1:2:1]' # JSON::JWS#sign! ES256 when 
> OpenSSL::PKey::EC key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:7:1:2:1]' # JSON::JWS#sign! ES256 when 
> OpenSSL::PKey::EC key given behaves like self_verifiable should be 
> self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:7:2:1:1]' # JSON::JWS#sign! ES256 when 
> JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:7:2:1:2:1]' # JSON::JWS#sign! ES256 when 
> JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:7:2:2:1]' # JSON::JWS#sign! ES256 when 
> JSON::JWK key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:8:1:1:1]' # JSON::JWS#sign! ES384 when 
> OpenSSL::PKey::EC key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:8:1:1:2:1]' # JSON::JWS#sign! ES384 when 
> OpenSSL::PKey::EC key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:8:1:2:1]' # JSON::JWS#sign! ES384 when 
> OpenSSL::PKey::EC key given behaves like self_verifiable should be 
> self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:8:2:1:1]' # JSON::JWS#sign! ES384 when 
> JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:8:2:1:2:1]' # JSON::JWS#sign! ES384 when 
> JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:8:2:2:1]' # JSON::JWS#sign! ES384 when 
> JSON::JWK key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:9:1:1:1]' # JSON::JWS#sign! ES512 when 
> OpenSSL::PKey::EC key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:9:1:1:2:1]' # JSON::JWS#sign! ES512 when 
> OpenSSL::PKey::EC key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:9:1:2:1]' # JSON::JWS#sign! ES512 when 
> OpenSSL::PKey::EC key given behaves like self_verifiable should be 
> self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:9:2:1:1]' # JSON::JWS#sign! ES512 when 
> JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:9:2:1:2:1]' # JSON::JWS#sign! ES512 when 
> JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:9:2:2:1]' # JSON::JWS#sign! ES512 when 
> JSON::JWK key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:10:1:1:1]' # JSON::JWS#sign! ES256K when 
> OpenSSL::PKey::EC key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:10:1:1:2:1]' # JSON::JWS#sign! ES256K when 
> OpenSSL::PKey::EC key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:10:1:2:1]' # JSON::JWS#sign! ES256K when 
> OpenSSL::PKey::EC key given behaves like self_verifiable should be 
> self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:10:2:1:1]' # JSON::JWS#sign! ES256K when 
> JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:10:2:1:2:1]' # JSON::JWS#sign! ES256K when 
> JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:10:2:2:1]' # JSON::JWS#sign! ES256K when 
> JSON::JWK key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:1]' # JSON::JWS#verify! RS256 when 
> JSON::JWK key given behaves like success_signature_verification is expected 
> not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:2:1]' # JSON::JWS#verify! RS256 when 
> JSON::JWK key given behaves like success_signature_verification header should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:3:1]' # JSON::JWS#verify! RS256 when 
> JSON::JWK key given behaves like success_signature_verification claims should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:1]' # JSON::JWS#verify! RS256 when 
> JSON::JWK key given behaves like success_signature_verification with blank 
> payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:2:1]' # JSON::JWS#verify! RS256 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:3:1]' # JSON::JWS#verify! RS256 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:1]' # JSON::JWS#verify! RS384 when 
> JSON::JWK key given behaves like success_signature_verification is expected 
> not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:2:1]' # JSON::JWS#verify! RS384 when 
> JSON::JWK key given behaves like success_signature_verification header should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:3:1]' # JSON::JWS#verify! RS384 when 
> JSON::JWK key given behaves like success_signature_verification claims should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:1]' # JSON::JWS#verify! RS384 when 
> JSON::JWK key given behaves like success_signature_verification with blank 
> payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:2:1]' # JSON::JWS#verify! RS384 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:3:1]' # JSON::JWS#verify! RS384 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:1]' # JSON::JWS#verify! RS512 when 
> JSON::JWK key given behaves like success_signature_verification is expected 
> not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:2:1]' # JSON::JWS#verify! RS512 when 
> JSON::JWK key given behaves like success_signature_verification header should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:3:1]' # JSON::JWS#verify! RS512 when 
> JSON::JWK key given behaves like success_signature_verification claims should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:1]' # JSON::JWS#verify! RS512 when 
> JSON::JWK key given behaves like success_signature_verification with blank 
> payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:2:1]' # JSON::JWS#verify! RS512 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:3:1]' # JSON::JWS#verify! RS512 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:1]' # JSON::JWS#verify! ES256 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification is 
> expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:2:1]' # JSON::JWS#verify! ES256 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification 
> header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:3:1]' # JSON::JWS#verify! ES256 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification 
> claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:1]' # JSON::JWS#verify! ES256 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification with 
> blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:2:1]' # JSON::JWS#verify! ES256 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:3:1]' # JSON::JWS#verify! ES256 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:1]' # JSON::JWS#verify! ES256 when 
> JSON::JWK key given behaves like success_signature_verification is expected 
> not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:2:1]' # JSON::JWS#verify! ES256 when 
> JSON::JWK key given behaves like success_signature_verification header should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:3:1]' # JSON::JWS#verify! ES256 when 
> JSON::JWK key given behaves like success_signature_verification claims should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:1]' # JSON::JWS#verify! ES256 when 
> JSON::JWK key given behaves like success_signature_verification with blank 
> payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:2:1]' # JSON::JWS#verify! ES256 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:3:1]' # JSON::JWS#verify! ES256 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:1]' # JSON::JWS#verify! ES384 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification is 
> expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:2:1]' # JSON::JWS#verify! ES384 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification 
> header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:3:1]' # JSON::JWS#verify! ES384 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification 
> claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:1]' # JSON::JWS#verify! ES384 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification with 
> blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:2:1]' # JSON::JWS#verify! ES384 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:3:1]' # JSON::JWS#verify! ES384 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:1]' # JSON::JWS#verify! ES384 when 
> JSON::JWK key given behaves like success_signature_verification is expected 
> not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:2:1]' # JSON::JWS#verify! ES384 when 
> JSON::JWK key given behaves like success_signature_verification header should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:3:1]' # JSON::JWS#verify! ES384 when 
> JSON::JWK key given behaves like success_signature_verification claims should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:1]' # JSON::JWS#verify! ES384 when 
> JSON::JWK key given behaves like success_signature_verification with blank 
> payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:2:1]' # JSON::JWS#verify! ES384 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:3:1]' # JSON::JWS#verify! ES384 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:1]' # JSON::JWS#verify! ES512 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification is 
> expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:2:1]' # JSON::JWS#verify! ES512 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification 
> header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:3:1]' # JSON::JWS#verify! ES512 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification 
> claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:1]' # JSON::JWS#verify! ES512 when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification with 
> blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:2:1]' # JSON::JWS#verify! ES512 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:3:1]' # JSON::JWS#verify! ES512 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:1]' # JSON::JWS#verify! ES512 when 
> JSON::JWK key given behaves like success_signature_verification is expected 
> not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:2:1]' # JSON::JWS#verify! ES512 when 
> JSON::JWK key given behaves like success_signature_verification header should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:3:1]' # JSON::JWS#verify! ES512 when 
> JSON::JWK key given behaves like success_signature_verification claims should 
> be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:1]' # JSON::JWS#verify! ES512 when 
> JSON::JWK key given behaves like success_signature_verification with blank 
> payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:2:1]' # JSON::JWS#verify! ES512 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:3:1]' # JSON::JWS#verify! ES512 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:1]' # JSON::JWS#verify! ES256K when 
> OpenSSL::PKey::EC key given behaves like success_signature_verification is 
> expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:2:1]' # JSON::JWS#verify! ES256K 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:3:1]' # JSON::JWS#verify! ES256K 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:1]' # JSON::JWS#verify! ES256K 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:2:1]' # JSON::JWS#verify! ES256K 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:3:1]' # JSON::JWS#verify! ES256K 
> when OpenSSL::PKey::EC key given behaves like success_signature_verification 
> with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:1]' # JSON::JWS#verify! ES256K when 
> JSON::JWK key given behaves like success_signature_verification is expected 
> not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:2:1]' # JSON::JWS#verify! ES256K 
> when JSON::JWK key given behaves like success_signature_verification header 
> should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:3:1]' # JSON::JWS#verify! ES256K 
> when JSON::JWK key given behaves like success_signature_verification claims 
> should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:1]' # JSON::JWS#verify! ES256K 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:2:1]' # JSON::JWS#verify! ES256K 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:3:1]' # JSON::JWS#verify! ES256K 
> when JSON::JWK key given behaves like success_signature_verification with 
> blank payload claims should be parsed successfully
> rspec ./spec/json/jwt_spec.rb:67 # JSON::JWT#sign when no algirithm specified 
> when key is EC key when prime256v1 alg 
> rspec ./spec/json/jwt_spec.rb:72 # JSON::JWT#sign when no algirithm specified 
> when key is EC key when secp384r1 alg 
> rspec ./spec/json/jwt_spec.rb:77 # JSON::JWT#sign when no algirithm specified 
> when key is EC key when secp521r1 alg 
> rspec ./spec/json/jwt_spec.rb:82 # JSON::JWT#sign when no algirithm specified 
> when key is EC key when secp256k1 alg 
> rspec ./spec/json/jwt_spec.rb:93 # JSON::JWT#sign when no algirithm specified 
> when key is JWK with kty=RSA alg 
> rspec ./spec/json/jwt_spec.rb:99 # JSON::JWT#sign when no algirithm specified 
> when key is JWK with kty=EC when prime256v1 alg 
> rspec ./spec/json/jwt_spec.rb:104 # JSON::JWT#sign when no algirithm 
> specified when key is JWK with kty=EC when secp384r1 alg 
> rspec ./spec/json/jwt_spec.rb:109 # JSON::JWT#sign when no algirithm 
> specified when key is JWK with kty=EC when secp521r1 alg 
> rspec ./spec/json/jwt_spec.rb:114 # JSON::JWT#sign when no algirithm 
> specified when key is JWK with kty=EC when secp256k1 alg 
> rspec ./spec/json/jwt_spec.rb:129 # JSON::JWT#sign when JWK is given should 
> set kid header automatically
> 
> /usr/bin/ruby3.0 
> -I/usr/share/rubygems-integration/all/gems/rspec-support-3.10.3/lib:/usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/lib
>  /usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/exe/rspec 
> --pattern ./spec/\*\*/\*_spec.rb --format documentation failed
> ERROR: Test "ruby3.0" failed: 


The full build log is available from:
http://qa-logs.debian.net/2022/05/25/ruby-json-jwt_1.13.0-1_unstable.log

All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20220525;users=lu...@debian.org
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20220525&fusertaguser=lu...@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

If you reassign this bug to another package, please marking it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.

--- End Message ---
--- Begin Message ---
Source: ruby-json-jwt
Source-Version: 1.14.0-2
Done: Utkarsh Gupta <utka...@debian.org>

We believe that the bug you reported is fixed in the latest version of
ruby-json-jwt, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1011...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Utkarsh Gupta <utka...@debian.org> (supplier of updated ruby-json-jwt package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 17 Sep 2022 16:44:10 +0530
Source: ruby-json-jwt
Architecture: source
Version: 1.14.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Team 
<pkg-ruby-extras-maintain...@lists.alioth.debian.org>
Changed-By: Utkarsh Gupta <utka...@debian.org>
Closes: 1011682
Changes:
 ruby-json-jwt (1.14.0-2) unstable; urgency=medium
 .
   * No-change rebuild for unstable. (Closes: #1011682)
   * Add myself as an uploader
Checksums-Sha1:
 9f1929148fa0723d028c8c7adf9d9f9f4fcd45f5 2190 ruby-json-jwt_1.14.0-2.dsc
 4cc490b72cb80a858b245d73038fe0ffdedf2701 26028 ruby-json-jwt_1.14.0.orig.tar.gz
 d0937dcb312d03c02b1f9b24c4b60fe4f12d8798 3168 
ruby-json-jwt_1.14.0-2.debian.tar.xz
 94c32fb8bec05bf50947039bd0dc0726f5c0ad45 14465 
ruby-json-jwt_1.14.0-2_source.buildinfo
Checksums-Sha256:
 2e07bfc0c45c7ef7688716724828a6dd1bd1e4e82aea6b7b07c24dc6591c9802 2190 
ruby-json-jwt_1.14.0-2.dsc
 a376944ef04e16f2d6ded9c5b52a602e4496c5524af7f2a1afa30e522bb74b60 26028 
ruby-json-jwt_1.14.0.orig.tar.gz
 228b35f503efd3db84648dee8fe27da0d10524bcc7ec630712b63fdaf9fd2cb0 3168 
ruby-json-jwt_1.14.0-2.debian.tar.xz
 7918e9f2c519fdeb0684a6fafa6811ca3ccd641e35ae987b56d90f3c6247dab7 14465 
ruby-json-jwt_1.14.0-2_source.buildinfo
Files:
 406331a2391dab49fc2aa305a1252b1e 2190 ruby optional ruby-json-jwt_1.14.0-2.dsc
 3b4c8cc602f2890f5e9953fdd22303c1 26028 ruby optional 
ruby-json-jwt_1.14.0.orig.tar.gz
 3a7dd1838416a7984af9ef4850bc4507 3168 ruby optional 
ruby-json-jwt_1.14.0-2.debian.tar.xz
 cc94710cc6c32a5a6dcd05a2381c5f87 14465 ruby optional 
ruby-json-jwt_1.14.0-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQJHBAEBCAAxFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAmMlrDUTHHV0a2Fyc2hA
ZGViaWFuLm9yZwAKCRCCPpZ2BsNLlg3KEADb/YkuDJMmduAcd4lZY2ObXgi3WRDe
PKYclVy/bvgxr3Ol2o7U3JT3OX86U/zaXFhAEKNlgvTMu82PmHRh+7MnymPkMUy7
XmeataUk5O3K5d9w3V/dvkDGrcF279I1jZzAR9XRSVVFNWpe9+jqAe5l0U2fy/wX
O4z3W13gaLcMXCd9PtdnMtlcXPu9V7uIU9l20Qus8rdv/cDpxeWF7ANwteg4Gxse
JFqiaUZowzbQ8jTtz4dI27W+BuZrXJ9AWIlMAoi1/0/GcsA3nSZFwfqyWSXZKYHX
RJUWnN2XurqRXcPCqjKXqvywP5LTu4UgIDenpE/NtOjQ3YkOjZi7jsGtKX1whTBR
WcPcj15ttbDFu5g7ziLauESXeZHdWwP2uBaRnq+8naTWJ8aFr9v0uW9lU0PvBN7P
RUEJGWm720lL1JQDtShK298ofxBnmuHwPwWKzQDsDsqaKQtDpkRuQ6zAGlPfEkse
H1xbX8paQe8LOBhFEN9VJsBw8F6C2P/1g4FhkBMX9+BHXLupaXO//19zcDveGjIE
OwQ/mGxfDiPr7oCZQbG0TBONR29ZF79owxbmyScs46nVJKvr6hcjD7Sf+anvLIcO
WMu3HRwt5LMFboupsaqFp7wZdp/3cPQwJhgDl+SbYNrGMLLRzulWiDJB6C1PkJvk
gt/ZJMhUnqajfw==
=0O4V
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to