[Pkg-javascript-devel] Bug#1009514: node-http-signature: FTBFS: ERROR: Coverage for statements (88.86%) does not meet global threshold (100%)
Lucas Nussbaum
lucas at debian.org
Tue Apr 12 20:19:24 BST 2022
Source: node-http-signature
Version: 1.3.6-1
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: lucas at debian.org
Usertags: ftbfs-20220412 ftbfs-bookworm
Hi,
During a rebuild of all packages in sid, your package failed to build
on amd64.
Relevant part (hopefully):
> debian/rules binary
> dh binary
> dh_update_autotools_config
> dh_autoreconf
> dh_auto_configure --buildsystem=nodejs
> dh_auto_build --buildsystem=nodejs
> No build command found, searching known files
> dh_auto_test --buildsystem=nodejs
> mkdir -p node_modules
> ln -s ../. node_modules/http-signature
> /bin/sh -ex debian/tests/pkg-js/test
> + set -e
> + set -x
> + mkdir -p node_modules
> + nodepath uuid
> + ln -s /usr/share/nodejs/uuid node_modules/uuid
> + + ls -1 test/convert.test.js test/examples.test.js test/header.test.js test/parser.test.js test/signer.test.js test/verify.test.js
> + grep -v examples.test.jsxargs tap
>
> TAP version 13
> (node:3386692) DeprecationWarning: strictEqual() is deprecated, use equal() instead
> (Use `node --trace-deprecation ...` to show where the warning was created)
> (node:3386690) DeprecationWarning: similar() is deprecated, use match() instead
> (Use `node --trace-deprecation ...` to show where the warning was created)
> ok 1 - test/convert.test.js # time=54.359ms {
> # Subtest: 1024b pem to rsa ssh key
> ok 1 - should be equal
> 1..1
> ok 1 - 1024b pem to rsa ssh key # time=11.31ms
>
> # Subtest: 2048b pem to rsa ssh key
> ok 1 - should be equal
> 1..1
> ok 2 - 2048b pem to rsa ssh key # time=1.899ms
>
> # Subtest: 4096b pem to rsa ssh key
> ok 1 - should be equal
> 1..1
> ok 3 - 4096b pem to rsa ssh key # time=1.317ms
>
> # Subtest: 1024b rsa ssh key
> ok 1 - should be equal
> 1..1
> ok 4 - 1024b rsa ssh key # time=4.391ms
>
> # Subtest: 2048b rsa ssh key
> ok 1 - should be equal
> 1..1
> ok 5 - 2048b rsa ssh key # time=1.725ms
>
> # Subtest: 4096b rsa ssh key
> ok 1 - should be equal
> 1..1
> ok 6 - 4096b rsa ssh key # time=1.259ms
>
> # Subtest: 1024b dsa ssh key
> ok 1 - should be equal
> 1..1
> ok 7 - 1024b dsa ssh key # time=1.372ms
>
> # Subtest: fingerprint
> ok 1 - should be equal
> 1..1
> ok 8 - fingerprint # time=1.812ms
>
> 1..8
> # time=54.359ms
> }
>
> ok 2 - test/header.test.js # time=57.763ms {
> # Subtest: setup
> ok 1 - expect truthy value
> 1..1
> ok 1 - setup # time=24.26ms
>
> # Subtest: header with 0 value
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> > Signature keyId="unit",algorithm="rsa-sha256",headers="date request-line content-length",signature="NRctKcjZL6WMsVFt9743vikccJbov/yc81S+PT0tORXManGTceNIQs2HxCil0h2ZcI8KLU3Q712GAUA23J5U2wTcoVfiPM/u9DTR9Up2lwlYVb5XrhGv62cRL9PUtEezcilB2sbYAUaancgTiJiFTKqqaaKwO6Z/cBR2/60miMo="
> 1..2
> ok 2 - header with 0 value # time=21.622ms
>
> # Subtest: header with boolean-mungable value
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> > Signature keyId="unit",algorithm="rsa-sha256",headers="date x-foo",signature="qx1pW4xEuEIzmctlcxoUH8f1Q0xsqUNYv6NHOJKvbMIuuTe7m211s9IRDS5p+NBh5YcTTLIuOSyAmCUGFL29e+WZpFZ1FXvOoIeDSf7B95xYZ+nWAMRaV+rJnoyJumnH0mlTUO637UWw8VyCGqYuUtN5T3rqkZHNIZL85lTcAKA="
> 1..2
> ok 3 - header with boolean-mungable value # time=5.466ms
>
> # Subtest: tear down
> 1..0
> ok 4 - tear down # time=0.988ms
>
> 1..4
> # time=57.763ms
> }
>
> (node:3386693) [DEP0005] DeprecationWarning: Buffer() is deprecated due to security and usability issues. Please use the Buffer.alloc(), Buffer.allocUnsafe(), or Buffer.from() methods instead.
> (Use `node --trace-deprecation ...` to show where the warning was created)
> ok 3 - test/parser.test.js # time=1385.694ms {
> # Subtest: setup
> 1..0
> ok 1 - setup # time=55.947ms
>
> # Subtest: no authorization
> ok 1 - should be equal
> ok 2 - should be equal
> 1..2
> ok 2 - no authorization # time=14.118ms
>
> # Subtest: bad scheme
> ok 1 - should be equal
> ok 2 - should be equal
> ok 3 - should be equal
> 1..3
> ok 3 - bad scheme # time=4.425ms
>
> # Subtest: no key id
> ok 1 - should be equal
> ok 2 - should be equal
> ok 3 - should be equal
> 1..3
> ok 4 - no key id # time=2.807ms
>
> # Subtest: key id no value
> ok 1 - should be equal
> ok 2 - should be equal
> ok 3 - should be equal
> 1..3
> ok 5 - key id no value # time=2.451ms
>
> # Subtest: key id no quotes
> ok 1 - should be equal
> ok 2 - should be equal
> ok 3 - should be equal
> 1..3
> ok 6 - key id no quotes # time=2.438ms
>
> # Subtest: key id param quotes
> ok 1 - should be equal
> ok 2 - should be equal
> ok 3 - should be equal
> 1..3
> ok 7 - key id param quotes # time=2.137ms
>
> # Subtest: param name with space
> ok 1 - should be equal
> ok 2 - should be equal
> ok 3 - should be equal
> 1..3
> ok 8 - param name with space # time=2.233ms
>
> # Subtest: no algorithm
> ok 1 - should be equal
> ok 2 - should be equal
> ok 3 - should be equal
> 1..3
> ok 9 - no algorithm # time=2.142ms
>
> # Subtest: algorithm no value
> ok 1 - should be equal
> ok 2 - should be equal
> ok 3 - should be equal
> 1..3
> ok 10 - algorithm no value # time=2.155ms
>
> # Subtest: no signature
> ok 1 - should be equal
> ok 2 - should be equal
> ok 3 - should be equal
> 1..3
> ok 11 - no signature # time=2.024ms
>
> # Subtest: invalid algorithm
> ok 1 - should be equal
> ok 2 - should be equal
> ok 3 - should be equal
> 1..3
> ok 12 - invalid algorithm # time=5.781ms
>
> # Subtest: no date header
> ok 1 - should be equal
> ok 2 - should be equal
> ok 3 - should be equal
> 1..3
> ok 13 - no date header # time=3.105ms
>
> # Subtest: valid numeric parameter
> ok 1 - should be equal
> 1..1
> ok 14 - valid numeric parameter # time=3.4ms
>
> # Subtest: invalid numeric parameter
> ok 1 - should be equal
> ok 2 - should be equal
> ok 3 - should be equal
> 1..3
> ok 15 - invalid numeric parameter # time=3.013ms
>
> # Subtest: invalid numeric parameter - decimal
> ok 1 - should be equal
> ok 2 - should be equal
> ok 3 - should be equal
> 1..3
> ok 16 - invalid numeric parameter - decimal # time=3.336ms
>
> # Subtest: invalid numeric parameter - signed integer
> ok 1 - should be equal
> ok 2 - should be equal
> ok 3 - should be equal
> 1..3
> ok 17 - invalid numeric parameter - signed integer # time=3.013ms
>
> # Subtest: created in future
> ok 1 - should be equal
> ok 2 - should match pattern provided
> ok 3 - should be equal
> 1..3
> ok 18 - created in future # time=6.322ms
>
> # Subtest: expires expired
> ok 1 - should be equal
> ok 2 - should match pattern provided
> ok 3 - should be equal
> 1..3
> ok 19 - expires expired # time=2.686ms
>
> # Subtest: valid created and expires with skew
> ok 1 - should be equal
> 1..1
> ok 20 - valid created and expires with skew # time=1.91ms
>
> # Subtest: valid default headers
> ok 1 - should be equal
> 1..1
> ok 21 - valid default headers # time=2.327ms
>
> # Subtest: valid custom authorizationHeaderName
> ok 1 - should be equal
> 1..1
> ok 22 - valid custom authorizationHeaderName # time=1.778ms
>
> # Subtest: explicit headers missing
> ok 1 - should be equal
> 1..1
> ok 23 - explicit headers missing # time=1.697ms
>
> # Subtest: valid explicit headers request-line
> ok 1 - should be equal
> {
> "scheme": "Signature",
> "params": {
> },
> "signingString": "date: Tue, 12 Apr 2022 16:45:59 GMT\ndigest: a37fc744-0e9a-4c72-a660-5bbd4fcb14b5\nGET / HTTP/1.1",
> "algorithm": "RSA-SHA256",
> "keyId": "fo,o"
> }
> "keyId": "fo,o",
> "algorithm": "rsa-sha256",
> "headers": [
> "date",
> "digest",
> "request-line"
> ],
> "extensions": "blah blah",
> "signature": "digitalSignature"
> ok 2 - expect truthy value
> ok 3 - should be equal
> ok 4 - expect truthy value
> ok 5 - should be equal
> ok 6 - should be equal
> ok 7 - should be equal
> ok 8 - expect truthy value
> ok 9 - should be equal
> ok 10 - should be equal
> ok 11 - should be equal
> ok 12 - should be equal
> ok 13 - should be equal
> ok 14 - expect truthy value
> ok 15 - should be equal
> ok 16 - should be equal
> ok 17 - should be equal
> 1..17
> ok 24 - valid explicit headers request-line # time=4.876ms
>
> # Subtest: valid explicit headers request-line strict true
> ok 1 - should be equal
> ok 2 - should be equal
> ok 3 - should be equal
> 1..3
> ok 25 - valid explicit headers request-line strict true # time=2.412ms
>
> # Subtest: valid explicit headers request-target
> ok 1 - should be equal
> {
> "scheme": "Signature",
> "params": {
> },
> "signingString": "date: Tue, 12 Apr 2022 16:45:59 GMT\ndigest: 27399012-23e6-45c0-b147-466332b71d4c\n(request-target): get /",
> "algorithm": "RSA-SHA256",
> "keyId": "fo,o"
> }
> "keyId": "fo,o",
> "algorithm": "rsa-sha256",
> "headers": [
> "date",
> "digest",
> "(request-target)"
> ],
> "extensions": "blah blah",
> "signature": "digitalSignature"
> ok 2 - expect truthy value
> ok 3 - should be equal
> ok 4 - expect truthy value
> ok 5 - should be equal
> ok 6 - should be equal
> ok 7 - should be equal
> ok 8 - expect truthy value
> ok 9 - should be equal
> ok 10 - should be equal
> ok 11 - should be equal
> ok 12 - should be equal
> ok 13 - should be equal
> ok 14 - expect truthy value
> ok 15 - should be equal
> ok 16 - should be equal
> ok 17 - should be equal
> 1..17
> ok 26 - valid explicit headers request-target # time=5.876ms
>
> # Subtest: expired
> ok 1 - should be equal
> 1..1
> ok 27 - expired # time=1210.667ms
>
> # Subtest: missing required header
> ok 1 - should be equal
> ok 2 - should be equal
> ok 3 - should be equal
> 1..3
> ok 28 - missing required header # time=7.159ms
>
> # Subtest: valid mixed case headers
> ok 1 - should be equal
> 1..1
> ok 29 - valid mixed case headers # time=2.99ms
>
> # Subtest: not whitelisted algorithm
> ok 1 - should be equal
> ok 2 - should be equal
> ok 3 - should be equal
> 1..3
> ok 30 - not whitelisted algorithm # time=3.313ms
>
> # Subtest: tearDown
> 1..0
> ok 31 - tearDown # time=1.106ms
>
> 1..31
> # time=1385.694ms
> }
>
> ok 4 - test/signer.test.js # time=179.941ms {
> # Subtest: setup
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> ok 3 - expect truthy value
> ok 4 - expect truthy value
> 1..4
> ok 1 - setup # time=34.521ms
>
> # Subtest: defaults
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> ok 3 - should be equal
> ok 4 - expect truthy value
> ok 5 - expect truthy value
> > Signature keyId="unitTest",algorithm="rsa-sha256",signature="VA4j7tIyy86iUX88YfK8utPgFWDpnDwuP/B5+QCj2+nCMVJbMKQaE4TqAnguU6Fnj4PcM2ZheePetcIMk7zaqx/XZ2fPiixYei0r3tmrkqTwcfxe1Dv4fZclx8x9aGyb7JPV9YboYDxaY4q152UjYLiWj+/Biev2jfBj3mFyhxQ="
> 1..5
> ok 2 - defaults # time=36.755ms
>
> # Subtest: with custom authorizationHeaderName
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> ok 3 - should be equal
> ok 4 - expect truthy value
> ok 5 - expect truthy value
> > Signature keyId="unitTest",algorithm="rsa-sha256",signature="VA4j7tIyy86iUX88YfK8utPgFWDpnDwuP/B5+QCj2+nCMVJbMKQaE4TqAnguU6Fnj4PcM2ZheePetcIMk7zaqx/XZ2fPiixYei0r3tmrkqTwcfxe1Dv4fZclx8x9aGyb7JPV9YboYDxaY4q152UjYLiWj+/Biev2jfBj3mFyhxQ="
> 1..5
> ok 3 - with custom authorizationHeaderName # time=6.09ms
>
> # Subtest: request line strict unspecified
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> ok 3 - should be equal
> ok 4 - expect truthy value
> > Signature keyId="unit",algorithm="rsa-sha256",headers="date request-line",signature="eYBWX7Rhh0xpM4GwTNyBurzuXrbot9GMXkKSKsyot5RopcPVYZFpD3mv2LyRRgDgKiVkjR7tjQjezgHdzB35T1f7GFScVmWYYKRf2Cn7r5XgFRMnKpVn2FfH3qtHWBlT9tRF1OyKqxd31rfIsIfxlEh/Xf4MGiD7nHV4RXAjNAY="
> 1..4
> ok 4 - request line strict unspecified # time=3.45ms
>
> # Subtest: request line strict false
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> ok 3 - expect truthy value
> ok 4 - expect truthy value
> > Signature keyId="unit",algorithm="rsa-sha256",headers="date request-line",signature="eYBWX7Rhh0xpM4GwTNyBurzuXrbot9GMXkKSKsyot5RopcPVYZFpD3mv2LyRRgDgKiVkjR7tjQjezgHdzB35T1f7GFScVmWYYKRf2Cn7r5XgFRMnKpVn2FfH3qtHWBlT9tRF1OyKqxd31rfIsIfxlEh/Xf4MGiD7nHV4RXAjNAY="
> 1..4
> ok 5 - request line strict false # time=3.233ms
>
> # Subtest: request line strict true
> ok 1 - expected to throw
> 1..1
> ok 6 - request line strict true # time=2.71ms
>
> # Subtest: request target
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> ok 3 - should be equal
> ok 4 - expect truthy value
> > Signature keyId="unit",algorithm="rsa-sha256",headers="date (request-target)",signature="IHR8HPwxmjeKpSkESDHHJw4THi38hB9kXzRdedCIdXIEXyJjvM6sC2d4XJfJ22orV3XYfe1748fRrMmrtpHJ3UZ5DD/54MNKs8R4HylTd0o4qywiUDZKGNyvE1s2D6Aa+DR18dXZdJRUVIIdt74euwisXgmWeQ0SjCSniExLHLA="
> 1..4
> ok 7 - request target # time=3.062ms
>
> # Subtest: keyid
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> ok 3 - should be equal
> ok 4 - expect truthy value
> > Signature keyId="unit",algorithm="rsa-sha256",headers="date (keyid)",signature="O4fxxHfYzP+JdMf+9Uvhx7I55mH4R7ygRN67QxCabRE+xJZOfk/BSeVVDzmdSuHaCSYfnyBA6QQ+jO1elb6XjVjsX9iXA/X6wWubcFct5PrOhUrOZRDsBD3s39BFJTZe40Rr6b8Fa/2CkRiupbR3Q+EiOZBeBMHgkfw/0syrwWY="
> 1..4
> ok 8 - keyid # time=5.865ms
>
> # Subtest: signing algorithm
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> ok 3 - should be equal
> ok 4 - should be equal
> ok 5 - should be equal
> ok 6 - expect truthy value
> > Signature keyId="unit",algorithm="rsa-sha256",headers="date (algorithm)",signature="KlzRtJmzdVrKdY2mJt9KqdopVe3EFslxyOeS+b9Dy/N6RIC8Xt1+BC2x4BMT2yTdscuo8tHEcT+ZzCKg2P3uTgPwc6+gTggqT+51+XqRe7FsbiVBzv6WQ4zlsCBjbvJKizgeFal5+K+9Ovvl/R21s9mFDNNbbsWcV1/+PM4tIrA="
> 1..6
> ok 9 - signing algorithm # time=5.186ms
>
> # Subtest: signing with unspecified algorithm
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> ok 3 - should be equal
> ok 4 - should be equal
> ok 5 - expect truthy value
> > Signature keyId="unit",algorithm="rsa-sha256",headers="date (algorithm)",signature="KlzRtJmzdVrKdY2mJt9KqdopVe3EFslxyOeS+b9Dy/N6RIC8Xt1+BC2x4BMT2yTdscuo8tHEcT+ZzCKg2P3uTgPwc6+gTggqT+51+XqRe7FsbiVBzv6WQ4zlsCBjbvJKizgeFal5+K+9Ovvl/R21s9mFDNNbbsWcV1/+PM4tIrA="
> 1..5
> ok 10 - signing with unspecified algorithm # time=4.703ms
>
> # Subtest: signing opaque param
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> ok 3 - should be equal
> ok 4 - should be equal
> ok 5 - expect truthy value
> > Signature keyId="unit",algorithm="rsa-sha256",opaque="opaque",headers="date (opaque)",signature="NU5Hye5p+VJs+fVSphcfRMaNX7NzH1S++eM0fl81+Gj96bk3qjYhGbS4Dm8iEvlJ9tSg6s4hQzdiFA9pYysYt90mNIAYsapbGx/vSrmqctBNYDUbwFGnqLPGNzZz2nCxJ6UGpvg7QLvGNYJVGPVMOu8NfAoS1enolp5ZgSQsh3Y="
> 1..5
> ok 11 - signing opaque param # time=3.784ms
>
> # Subtest: signing with key protected with passphrase
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> ok 3 - should be equal
> ok 4 - should be equal
> ok 5 - expect truthy value
> > Signature keyId="unit",algorithm="rsa-sha256",headers="date (algorithm)",signature="D4M8vJ1MO/rovjNpaavF7oqq3A5Ij6FsKpipktpgbG8sd8p31hfjpC8KcOrhPIRSPmAWaWVcKut2oPWDinOP5HNyr7ecH7iKARjF3n6VSglBBRTghAdA8ZMsxPoUmT1DxFNjqdMaltpACvHMbUrhhVvfwM7pizdvfB191HXpPvc="
> 1..5
> ok 12 - signing with key protected with passphrase # time=23.484ms
>
> # Subtest: request-target with dsa key
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> > Signature keyId="unit",algorithm="dsa-sha1",headers="date (request-target)",signature="MC0CFQCRavKIky29gtgKvY4PIaOODxr3CwIUMZgM9MUc/Iah1Iq1M3PhaasHm70="
> 1..2
> ok 13 - request-target with dsa key # time=3.086ms
>
> # Subtest: request-target with ecdsa key
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> > Signature keyId="unit",algorithm="ecdsa-sha256",headers="date (request-target)",signature="MEUCIQDLw5IevWyMt2BPKbWRbE6BATJB9klREzOzRiSN2mG9hAIgL1IGBR+Ode0L00/udQbZFXeJKzdwsDkiPx9+of27fyE="
> 1..2
> ok 14 - request-target with ecdsa key # time=3.203ms
>
> # Subtest: hmac
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> > Signature keyId="unit",algorithm="hmac-sha1",signature="1IBR42MK7/IXJGqsdf0mT3R9JLQ="
> 1..2
> ok 15 - hmac # time=1.936ms
>
> # Subtest: createSigner with RSA key
> ok 1 - should not error
> > Signature keyId="foo",algorithm="rsa-sha1",headers="(request-target) date",signature="XosDwHJYgyUJK5Q5TOqP7xOUF2CEvlp9PGPCdeyJmRELr4/sE+uVyvrMHkqDvK7LnJinloE/43uB1WWmBNfOM2jhbmRkdsrivZsyENiRVkuy9sae23thmm7wunyovKtSIninm8yhUrmxqavdV57n5CrZaQBqTeQxUCroA6NTUe8="
> 1..1
> ok 16 - createSigner with RSA key # time=3.419ms
>
> # Subtest: createSigner with RSA key, auto algo
> ok 1 - should not error
> 1..1
> ok 17 - createSigner with RSA key, auto algo # time=2.526ms
>
> # Subtest: createSigner with RSA key, auto algo, passphrase
> ok 1 - should not error
> 1..1
> ok 18 - createSigner with RSA key, auto algo, passphrase # time=18.448ms
>
> # Subtest: createSigner with HMAC key
> ok 1 - should not error
> 1..1
> ok 19 - createSigner with HMAC key # time=2.143ms
>
> # Subtest: createSigner with sign function
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> ok 3 - should be equal
> ok 4 - should not error
> ok 5 - expect truthy value
> 1..5
> ok 20 - createSigner with sign function # time=2.512ms
>
> # Subtest: tear down
> 1..0
> ok 21 - tear down # time=0.9ms
>
> 1..21
> # time=179.941ms
> }
>
> ok 5 - test/verify.test.js # time=162.933ms {
> # Subtest: setup
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> ok 3 - expect truthy value
> ok 4 - expect truthy value
> ok 5 - expect truthy value
> ok 6 - expect truthy value
> 1..6
> ok 1 - setup # time=77.921ms
>
> # Subtest: invalid hmac
> ok 1 - expect truthy value
> ok 2 - should be equal
> 1..2
> ok 2 - invalid hmac # time=20.206ms
>
> # Subtest: valid hmac
> ok 1 - expect truthy value
> ok 2 - should be equal
> 1..2
> ok 3 - valid hmac # time=4.537ms
>
> # Subtest: invalid raw hmac
> ok 1 - expect truthy value
> ok 2 - should be equal
> 1..2
> ok 4 - invalid raw hmac # time=2.759ms
>
> # Subtest: valid raw hmac
> ok 1 - expect truthy value
> ok 2 - should be equal
> 1..2
> ok 5 - valid raw hmac # time=2.677ms
>
> # Subtest: invalid rsa
> ok 1 - expect truthy value
> ok 2 - should be equal
> 1..2
> ok 6 - invalid rsa # time=7.013ms
>
> # Subtest: valid rsa
> ok 1 - expect truthy value
> ok 2 - should be equal
> 1..2
> ok 7 - valid rsa # time=4.177ms
>
> # Subtest: invalid dsa
> ok 1 - expect truthy value
> ok 2 - should be equal
> 1..2
> ok 8 - invalid dsa # time=3.081ms
>
> # Subtest: valid dsa
> ok 1 - expect truthy value
> ok 2 - should be equal
> 1..2
> ok 9 - valid dsa # time=4.951ms
>
> # Subtest: invalid ecdsa
> ok 1 - expect truthy value
> ok 2 - should be equal
> 1..2
> ok 10 - invalid ecdsa # time=3.347ms
>
> # Subtest: valid ecdsa
> ok 1 - expect truthy value
> ok 2 - should be equal
> 1..2
> ok 11 - valid ecdsa # time=3.475ms
>
> # Subtest: invalid date
> ok 1 - expected to throw
> ok 2 - should be equal
> 1..2
> ok 12 - invalid date # time=3.307ms
>
> # Subtest: valid rsa from spec default
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> ok 3 - should be equal
> 1..3
> ok 13 - valid rsa from spec default # time=3.347ms
>
> # Subtest: valid rsa from spec default
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> ok 3 - should be equal
> 1..3
> ok 14 - valid rsa from spec default # time=3.915ms
>
> # Subtest: valid rsa from spec all headers
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> ok 3 - should be equal
> 1..3
> ok 15 - valid rsa from spec all headers # time=3.536ms
>
> # Subtest: valid rsa from spec all headers (request-target)
> ok 1 - expect truthy value
> ok 2 - expect truthy value
> ok 3 - should be equal
> 1..3
> ok 16 - valid rsa from spec all headers (request-target) # time=3.321ms
>
> # Subtest: tear down
> 1..0
> ok 17 - tear down # time=0.81ms
>
> 1..17
> # time=162.933ms
> }
>
> 1..5
> # time=3161.751ms
> ERROR: Coverage for lines (88.81%) does not meet global threshold (100%)
> ERROR: Coverage for functions (93.1%) does not meet global threshold (100%)
> ERROR: Coverage for branches (77.86%) does not meet global threshold (100%)
> ERROR: Coverage for statements (88.86%) does not meet global threshold (100%)
> -----------|---------|----------|---------|---------|-----------------------------------------------
> File | % Stmts | % Branch | % Funcs | % Lines | Uncovered Line #s
> -----------|---------|----------|---------|---------|-----------------------------------------------
> All files | 88.86 | 77.86 | 93.1 | 88.81 |
> index.js | 100 | 100 | 100 | 100 |
> parser.js | 92.07 | 85.59 | 100 | 92.02 | 172,223,228,233,240,269,295,297,299-304,325
> signer.js | 85.32 | 72.8 | 85.71 | 85.25 | ...49,360,367,387,416,420-422,424-430,434,458
> utils.js | 93.75 | 66.66 | 100 | 93.75 | 47,52
> verify.js | 89.74 | 66.66 | 100 | 89.74 | 35,58,81,84
> -----------|---------|----------|---------|---------|-----------------------------------------------
> dh_auto_test: error: /bin/sh -ex debian/tests/pkg-js/test returned exit code 123
The full build log is available from:
http://qa-logs.debian.net/2022/04/12/node-http-signature_1.3.6-1_unstable.log
All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20220412;users=lucas@debian.org
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20220412&fusertaguser=lucas@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results
A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!
If you reassign this bug to another package, please marking it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects
If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.
More information about the Pkg-javascript-devel
mailing list