[Pkg-javascript-devel] Bug#1009514: node-http-signature: FTBFS: ERROR: Coverage for statements (88.86%) does not meet global threshold (100%)

Lucas Nussbaum lucas at debian.org
Tue Apr 12 20:19:24 BST 2022


Source: node-http-signature
Version: 1.3.6-1
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: lucas at debian.org
Usertags: ftbfs-20220412 ftbfs-bookworm

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.


Relevant part (hopefully):
>  debian/rules binary
> dh binary
>    dh_update_autotools_config
>    dh_autoreconf
>    dh_auto_configure --buildsystem=nodejs
>    dh_auto_build --buildsystem=nodejs
> No build command found, searching known files
>    dh_auto_test --buildsystem=nodejs
> 	mkdir -p node_modules
> 	ln -s ../. node_modules/http-signature
> 	/bin/sh -ex debian/tests/pkg-js/test
> + set -e
> + set -x
> + mkdir -p node_modules
> + nodepath uuid
> + ln -s /usr/share/nodejs/uuid node_modules/uuid
> + + ls -1 test/convert.test.js test/examples.test.js test/header.test.js test/parser.test.js test/signer.test.js test/verify.test.js
> + grep -v examples.test.jsxargs tap
> 
> TAP version 13
> (node:3386692) DeprecationWarning: strictEqual() is deprecated, use equal() instead
> (Use `node --trace-deprecation ...` to show where the warning was created)
> (node:3386690) DeprecationWarning: similar() is deprecated, use match() instead
> (Use `node --trace-deprecation ...` to show where the warning was created)
> ok 1 - test/convert.test.js # time=54.359ms {
>     # Subtest: 1024b pem to rsa ssh key
>         ok 1 - should be equal
>         1..1
>     ok 1 - 1024b pem to rsa ssh key # time=11.31ms
>     
>     # Subtest: 2048b pem to rsa ssh key
>         ok 1 - should be equal
>         1..1
>     ok 2 - 2048b pem to rsa ssh key # time=1.899ms
>     
>     # Subtest: 4096b pem to rsa ssh key
>         ok 1 - should be equal
>         1..1
>     ok 3 - 4096b pem to rsa ssh key # time=1.317ms
>     
>     # Subtest: 1024b rsa ssh key
>         ok 1 - should be equal
>         1..1
>     ok 4 - 1024b rsa ssh key # time=4.391ms
>     
>     # Subtest: 2048b rsa ssh key
>         ok 1 - should be equal
>         1..1
>     ok 5 - 2048b rsa ssh key # time=1.725ms
>     
>     # Subtest: 4096b rsa ssh key
>         ok 1 - should be equal
>         1..1
>     ok 6 - 4096b rsa ssh key # time=1.259ms
>     
>     # Subtest: 1024b dsa ssh key
>         ok 1 - should be equal
>         1..1
>     ok 7 - 1024b dsa ssh key # time=1.372ms
>     
>     # Subtest: fingerprint
>         ok 1 - should be equal
>         1..1
>     ok 8 - fingerprint # time=1.812ms
>     
>     1..8
>     # time=54.359ms
> }
> 
> ok 2 - test/header.test.js # time=57.763ms {
>     # Subtest: setup
>         ok 1 - expect truthy value
>         1..1
>     ok 1 - setup # time=24.26ms
>     
>     # Subtest: header with 0 value
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date request-line content-length",signature="NRctKcjZL6WMsVFt9743vikccJbov/yc81S+PT0tORXManGTceNIQs2HxCil0h2ZcI8KLU3Q712GAUA23J5U2wTcoVfiPM/u9DTR9Up2lwlYVb5XrhGv62cRL9PUtEezcilB2sbYAUaancgTiJiFTKqqaaKwO6Z/cBR2/60miMo="
>         1..2
>     ok 2 - header with 0 value # time=21.622ms
>     
>     # Subtest: header with boolean-mungable value
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date x-foo",signature="qx1pW4xEuEIzmctlcxoUH8f1Q0xsqUNYv6NHOJKvbMIuuTe7m211s9IRDS5p+NBh5YcTTLIuOSyAmCUGFL29e+WZpFZ1FXvOoIeDSf7B95xYZ+nWAMRaV+rJnoyJumnH0mlTUO637UWw8VyCGqYuUtN5T3rqkZHNIZL85lTcAKA="
>         1..2
>     ok 3 - header with boolean-mungable value # time=5.466ms
>     
>     # Subtest: tear down
>         1..0
>     ok 4 - tear down # time=0.988ms
>     
>     1..4
>     # time=57.763ms
> }
> 
> (node:3386693) [DEP0005] DeprecationWarning: Buffer() is deprecated due to security and usability issues. Please use the Buffer.alloc(), Buffer.allocUnsafe(), or Buffer.from() methods instead.
> (Use `node --trace-deprecation ...` to show where the warning was created)
> ok 3 - test/parser.test.js # time=1385.694ms {
>     # Subtest: setup
>         1..0
>     ok 1 - setup # time=55.947ms
>     
>     # Subtest: no authorization
>         ok 1 - should be equal
>         ok 2 - should be equal
>         1..2
>     ok 2 - no authorization # time=14.118ms
>     
>     # Subtest: bad scheme
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 3 - bad scheme # time=4.425ms
>     
>     # Subtest: no key id
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 4 - no key id # time=2.807ms
>     
>     # Subtest: key id no value
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 5 - key id no value # time=2.451ms
>     
>     # Subtest: key id no quotes
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 6 - key id no quotes # time=2.438ms
>     
>     # Subtest: key id param quotes
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 7 - key id param quotes # time=2.137ms
>     
>     # Subtest: param name with space
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 8 - param name with space # time=2.233ms
>     
>     # Subtest: no algorithm
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 9 - no algorithm # time=2.142ms
>     
>     # Subtest: algorithm no value
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 10 - algorithm no value # time=2.155ms
>     
>     # Subtest: no signature
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 11 - no signature # time=2.024ms
>     
>     # Subtest: invalid algorithm
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 12 - invalid algorithm # time=5.781ms
>     
>     # Subtest: no date header
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 13 - no date header # time=3.105ms
>     
>     # Subtest: valid numeric parameter
>         ok 1 - should be equal
>         1..1
>     ok 14 - valid numeric parameter # time=3.4ms
>     
>     # Subtest: invalid numeric parameter
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 15 - invalid numeric parameter # time=3.013ms
>     
>     # Subtest: invalid numeric parameter - decimal
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 16 - invalid numeric parameter - decimal # time=3.336ms
>     
>     # Subtest: invalid numeric parameter - signed integer
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 17 - invalid numeric parameter - signed integer # time=3.013ms
>     
>     # Subtest: created in future
>         ok 1 - should be equal
>         ok 2 - should match pattern provided
>         ok 3 - should be equal
>         1..3
>     ok 18 - created in future # time=6.322ms
>     
>     # Subtest: expires expired
>         ok 1 - should be equal
>         ok 2 - should match pattern provided
>         ok 3 - should be equal
>         1..3
>     ok 19 - expires expired # time=2.686ms
>     
>     # Subtest: valid created and expires with skew
>         ok 1 - should be equal
>         1..1
>     ok 20 - valid created and expires with skew # time=1.91ms
>     
>     # Subtest: valid default headers
>         ok 1 - should be equal
>         1..1
>     ok 21 - valid default headers # time=2.327ms
>     
>     # Subtest: valid custom authorizationHeaderName
>         ok 1 - should be equal
>         1..1
>     ok 22 - valid custom authorizationHeaderName # time=1.778ms
>     
>     # Subtest: explicit headers missing
>         ok 1 - should be equal
>         1..1
>     ok 23 - explicit headers missing # time=1.697ms
>     
>     # Subtest: valid explicit headers request-line
>         ok 1 - should be equal
>     {
>       "scheme": "Signature",
>       "params": {
>       },
>       "signingString": "date: Tue, 12 Apr 2022 16:45:59 GMT\ndigest: a37fc744-0e9a-4c72-a660-5bbd4fcb14b5\nGET / HTTP/1.1",
>       "algorithm": "RSA-SHA256",
>       "keyId": "fo,o"
>     }
>         "keyId": "fo,o",
>         "algorithm": "rsa-sha256",
>         "headers": [
>           "date",
>           "digest",
>           "request-line"
>         ],
>         "extensions": "blah blah",
>         "signature": "digitalSignature"
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - expect truthy value
>         ok 5 - should be equal
>         ok 6 - should be equal
>         ok 7 - should be equal
>         ok 8 - expect truthy value
>         ok 9 - should be equal
>         ok 10 - should be equal
>         ok 11 - should be equal
>         ok 12 - should be equal
>         ok 13 - should be equal
>         ok 14 - expect truthy value
>         ok 15 - should be equal
>         ok 16 - should be equal
>         ok 17 - should be equal
>         1..17
>     ok 24 - valid explicit headers request-line # time=4.876ms
>     
>     # Subtest: valid explicit headers request-line strict true
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 25 - valid explicit headers request-line strict true # time=2.412ms
>     
>     # Subtest: valid explicit headers request-target
>         ok 1 - should be equal
>     {
>       "scheme": "Signature",
>       "params": {
>       },
>       "signingString": "date: Tue, 12 Apr 2022 16:45:59 GMT\ndigest: 27399012-23e6-45c0-b147-466332b71d4c\n(request-target): get /",
>       "algorithm": "RSA-SHA256",
>       "keyId": "fo,o"
>     }
>         "keyId": "fo,o",
>         "algorithm": "rsa-sha256",
>         "headers": [
>           "date",
>           "digest",
>           "(request-target)"
>         ],
>         "extensions": "blah blah",
>         "signature": "digitalSignature"
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - expect truthy value
>         ok 5 - should be equal
>         ok 6 - should be equal
>         ok 7 - should be equal
>         ok 8 - expect truthy value
>         ok 9 - should be equal
>         ok 10 - should be equal
>         ok 11 - should be equal
>         ok 12 - should be equal
>         ok 13 - should be equal
>         ok 14 - expect truthy value
>         ok 15 - should be equal
>         ok 16 - should be equal
>         ok 17 - should be equal
>         1..17
>     ok 26 - valid explicit headers request-target # time=5.876ms
>     
>     # Subtest: expired
>         ok 1 - should be equal
>         1..1
>     ok 27 - expired # time=1210.667ms
>     
>     # Subtest: missing required header
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 28 - missing required header # time=7.159ms
>     
>     # Subtest: valid mixed case headers
>         ok 1 - should be equal
>         1..1
>     ok 29 - valid mixed case headers # time=2.99ms
>     
>     # Subtest: not whitelisted algorithm
>         ok 1 - should be equal
>         ok 2 - should be equal
>         ok 3 - should be equal
>         1..3
>     ok 30 - not whitelisted algorithm # time=3.313ms
>     
>     # Subtest: tearDown
>         1..0
>     ok 31 - tearDown # time=1.106ms
>     
>     1..31
>     # time=1385.694ms
> }
> 
> ok 4 - test/signer.test.js # time=179.941ms {
>     # Subtest: setup
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - expect truthy value
>         ok 4 - expect truthy value
>         1..4
>     ok 1 - setup # time=34.521ms
>     
>     # Subtest: defaults
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - expect truthy value
>         ok 5 - expect truthy value
>     > Signature keyId="unitTest",algorithm="rsa-sha256",signature="VA4j7tIyy86iUX88YfK8utPgFWDpnDwuP/B5+QCj2+nCMVJbMKQaE4TqAnguU6Fnj4PcM2ZheePetcIMk7zaqx/XZ2fPiixYei0r3tmrkqTwcfxe1Dv4fZclx8x9aGyb7JPV9YboYDxaY4q152UjYLiWj+/Biev2jfBj3mFyhxQ="
>         1..5
>     ok 2 - defaults # time=36.755ms
>     
>     # Subtest: with custom authorizationHeaderName
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - expect truthy value
>         ok 5 - expect truthy value
>     > Signature keyId="unitTest",algorithm="rsa-sha256",signature="VA4j7tIyy86iUX88YfK8utPgFWDpnDwuP/B5+QCj2+nCMVJbMKQaE4TqAnguU6Fnj4PcM2ZheePetcIMk7zaqx/XZ2fPiixYei0r3tmrkqTwcfxe1Dv4fZclx8x9aGyb7JPV9YboYDxaY4q152UjYLiWj+/Biev2jfBj3mFyhxQ="
>         1..5
>     ok 3 - with custom authorizationHeaderName # time=6.09ms
>     
>     # Subtest: request line strict unspecified
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date request-line",signature="eYBWX7Rhh0xpM4GwTNyBurzuXrbot9GMXkKSKsyot5RopcPVYZFpD3mv2LyRRgDgKiVkjR7tjQjezgHdzB35T1f7GFScVmWYYKRf2Cn7r5XgFRMnKpVn2FfH3qtHWBlT9tRF1OyKqxd31rfIsIfxlEh/Xf4MGiD7nHV4RXAjNAY="
>         1..4
>     ok 4 - request line strict unspecified # time=3.45ms
>     
>     # Subtest: request line strict false
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - expect truthy value
>         ok 4 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date request-line",signature="eYBWX7Rhh0xpM4GwTNyBurzuXrbot9GMXkKSKsyot5RopcPVYZFpD3mv2LyRRgDgKiVkjR7tjQjezgHdzB35T1f7GFScVmWYYKRf2Cn7r5XgFRMnKpVn2FfH3qtHWBlT9tRF1OyKqxd31rfIsIfxlEh/Xf4MGiD7nHV4RXAjNAY="
>         1..4
>     ok 5 - request line strict false # time=3.233ms
>     
>     # Subtest: request line strict true
>         ok 1 - expected to throw
>         1..1
>     ok 6 - request line strict true # time=2.71ms
>     
>     # Subtest: request target
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date (request-target)",signature="IHR8HPwxmjeKpSkESDHHJw4THi38hB9kXzRdedCIdXIEXyJjvM6sC2d4XJfJ22orV3XYfe1748fRrMmrtpHJ3UZ5DD/54MNKs8R4HylTd0o4qywiUDZKGNyvE1s2D6Aa+DR18dXZdJRUVIIdt74euwisXgmWeQ0SjCSniExLHLA="
>         1..4
>     ok 7 - request target # time=3.062ms
>     
>     # Subtest: keyid
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date (keyid)",signature="O4fxxHfYzP+JdMf+9Uvhx7I55mH4R7ygRN67QxCabRE+xJZOfk/BSeVVDzmdSuHaCSYfnyBA6QQ+jO1elb6XjVjsX9iXA/X6wWubcFct5PrOhUrOZRDsBD3s39BFJTZe40Rr6b8Fa/2CkRiupbR3Q+EiOZBeBMHgkfw/0syrwWY="
>         1..4
>     ok 8 - keyid # time=5.865ms
>     
>     # Subtest: signing algorithm
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - should be equal
>         ok 5 - should be equal
>         ok 6 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date (algorithm)",signature="KlzRtJmzdVrKdY2mJt9KqdopVe3EFslxyOeS+b9Dy/N6RIC8Xt1+BC2x4BMT2yTdscuo8tHEcT+ZzCKg2P3uTgPwc6+gTggqT+51+XqRe7FsbiVBzv6WQ4zlsCBjbvJKizgeFal5+K+9Ovvl/R21s9mFDNNbbsWcV1/+PM4tIrA="
>         1..6
>     ok 9 - signing algorithm # time=5.186ms
>     
>     # Subtest: signing with unspecified algorithm
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - should be equal
>         ok 5 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date (algorithm)",signature="KlzRtJmzdVrKdY2mJt9KqdopVe3EFslxyOeS+b9Dy/N6RIC8Xt1+BC2x4BMT2yTdscuo8tHEcT+ZzCKg2P3uTgPwc6+gTggqT+51+XqRe7FsbiVBzv6WQ4zlsCBjbvJKizgeFal5+K+9Ovvl/R21s9mFDNNbbsWcV1/+PM4tIrA="
>         1..5
>     ok 10 - signing with unspecified algorithm # time=4.703ms
>     
>     # Subtest: signing opaque param
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - should be equal
>         ok 5 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",opaque="opaque",headers="date (opaque)",signature="NU5Hye5p+VJs+fVSphcfRMaNX7NzH1S++eM0fl81+Gj96bk3qjYhGbS4Dm8iEvlJ9tSg6s4hQzdiFA9pYysYt90mNIAYsapbGx/vSrmqctBNYDUbwFGnqLPGNzZz2nCxJ6UGpvg7QLvGNYJVGPVMOu8NfAoS1enolp5ZgSQsh3Y="
>         1..5
>     ok 11 - signing opaque param # time=3.784ms
>     
>     # Subtest: signing with key protected with passphrase
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - should be equal
>         ok 5 - expect truthy value
>     > Signature keyId="unit",algorithm="rsa-sha256",headers="date (algorithm)",signature="D4M8vJ1MO/rovjNpaavF7oqq3A5Ij6FsKpipktpgbG8sd8p31hfjpC8KcOrhPIRSPmAWaWVcKut2oPWDinOP5HNyr7ecH7iKARjF3n6VSglBBRTghAdA8ZMsxPoUmT1DxFNjqdMaltpACvHMbUrhhVvfwM7pizdvfB191HXpPvc="
>         1..5
>     ok 12 - signing with key protected with passphrase # time=23.484ms
>     
>     # Subtest: request-target with dsa key
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>     > Signature keyId="unit",algorithm="dsa-sha1",headers="date (request-target)",signature="MC0CFQCRavKIky29gtgKvY4PIaOODxr3CwIUMZgM9MUc/Iah1Iq1M3PhaasHm70="
>         1..2
>     ok 13 - request-target with dsa key # time=3.086ms
>     
>     # Subtest: request-target with ecdsa key
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>     > Signature keyId="unit",algorithm="ecdsa-sha256",headers="date (request-target)",signature="MEUCIQDLw5IevWyMt2BPKbWRbE6BATJB9klREzOzRiSN2mG9hAIgL1IGBR+Ode0L00/udQbZFXeJKzdwsDkiPx9+of27fyE="
>         1..2
>     ok 14 - request-target with ecdsa key # time=3.203ms
>     
>     # Subtest: hmac
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>     > Signature keyId="unit",algorithm="hmac-sha1",signature="1IBR42MK7/IXJGqsdf0mT3R9JLQ="
>         1..2
>     ok 15 - hmac # time=1.936ms
>     
>     # Subtest: createSigner with RSA key
>         ok 1 - should not error
>     > Signature keyId="foo",algorithm="rsa-sha1",headers="(request-target) date",signature="XosDwHJYgyUJK5Q5TOqP7xOUF2CEvlp9PGPCdeyJmRELr4/sE+uVyvrMHkqDvK7LnJinloE/43uB1WWmBNfOM2jhbmRkdsrivZsyENiRVkuy9sae23thmm7wunyovKtSIninm8yhUrmxqavdV57n5CrZaQBqTeQxUCroA6NTUe8="
>         1..1
>     ok 16 - createSigner with RSA key # time=3.419ms
>     
>     # Subtest: createSigner with RSA key, auto algo
>         ok 1 - should not error
>         1..1
>     ok 17 - createSigner with RSA key, auto algo # time=2.526ms
>     
>     # Subtest: createSigner with RSA key, auto algo, passphrase
>         ok 1 - should not error
>         1..1
>     ok 18 - createSigner with RSA key, auto algo, passphrase # time=18.448ms
>     
>     # Subtest: createSigner with HMAC key
>         ok 1 - should not error
>         1..1
>     ok 19 - createSigner with HMAC key # time=2.143ms
>     
>     # Subtest: createSigner with sign function
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         ok 4 - should not error
>         ok 5 - expect truthy value
>         1..5
>     ok 20 - createSigner with sign function # time=2.512ms
>     
>     # Subtest: tear down
>         1..0
>     ok 21 - tear down # time=0.9ms
>     
>     1..21
>     # time=179.941ms
> }
> 
> ok 5 - test/verify.test.js # time=162.933ms {
>     # Subtest: setup
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - expect truthy value
>         ok 4 - expect truthy value
>         ok 5 - expect truthy value
>         ok 6 - expect truthy value
>         1..6
>     ok 1 - setup # time=77.921ms
>     
>     # Subtest: invalid hmac
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 2 - invalid hmac # time=20.206ms
>     
>     # Subtest: valid hmac
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 3 - valid hmac # time=4.537ms
>     
>     # Subtest: invalid raw hmac
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 4 - invalid raw hmac # time=2.759ms
>     
>     # Subtest: valid raw hmac
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 5 - valid raw hmac # time=2.677ms
>     
>     # Subtest: invalid rsa
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 6 - invalid rsa # time=7.013ms
>     
>     # Subtest: valid rsa
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 7 - valid rsa # time=4.177ms
>     
>     # Subtest: invalid dsa
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 8 - invalid dsa # time=3.081ms
>     
>     # Subtest: valid dsa
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 9 - valid dsa # time=4.951ms
>     
>     # Subtest: invalid ecdsa
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 10 - invalid ecdsa # time=3.347ms
>     
>     # Subtest: valid ecdsa
>         ok 1 - expect truthy value
>         ok 2 - should be equal
>         1..2
>     ok 11 - valid ecdsa # time=3.475ms
>     
>     # Subtest: invalid date
>         ok 1 - expected to throw
>         ok 2 - should be equal
>         1..2
>     ok 12 - invalid date # time=3.307ms
>     
>     # Subtest: valid rsa from spec default
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         1..3
>     ok 13 - valid rsa from spec default # time=3.347ms
>     
>     # Subtest: valid rsa from spec default
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         1..3
>     ok 14 - valid rsa from spec default # time=3.915ms
>     
>     # Subtest: valid rsa from spec all headers
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         1..3
>     ok 15 - valid rsa from spec all headers # time=3.536ms
>     
>     # Subtest: valid rsa from spec all headers (request-target)
>         ok 1 - expect truthy value
>         ok 2 - expect truthy value
>         ok 3 - should be equal
>         1..3
>     ok 16 - valid rsa from spec all headers (request-target) # time=3.321ms
>     
>     # Subtest: tear down
>         1..0
>     ok 17 - tear down # time=0.81ms
>     
>     1..17
>     # time=162.933ms
> }
> 
> 1..5
> # time=3161.751ms
> ERROR: Coverage for lines (88.81%) does not meet global threshold (100%)
> ERROR: Coverage for functions (93.1%) does not meet global threshold (100%)
> ERROR: Coverage for branches (77.86%) does not meet global threshold (100%)
> ERROR: Coverage for statements (88.86%) does not meet global threshold (100%)
> -----------|---------|----------|---------|---------|-----------------------------------------------
> File       | % Stmts | % Branch | % Funcs | % Lines | Uncovered Line #s                             
> -----------|---------|----------|---------|---------|-----------------------------------------------
> All files  |   88.86 |    77.86 |    93.1 |   88.81 |                                               
>  index.js  |     100 |      100 |     100 |     100 |                                               
>  parser.js |   92.07 |    85.59 |     100 |   92.02 | 172,223,228,233,240,269,295,297,299-304,325   
>  signer.js |   85.32 |     72.8 |   85.71 |   85.25 | ...49,360,367,387,416,420-422,424-430,434,458 
>  utils.js  |   93.75 |    66.66 |     100 |   93.75 | 47,52                                         
>  verify.js |   89.74 |    66.66 |     100 |   89.74 | 35,58,81,84                                   
> -----------|---------|----------|---------|---------|-----------------------------------------------
> dh_auto_test: error: /bin/sh -ex debian/tests/pkg-js/test returned exit code 123


The full build log is available from:
http://qa-logs.debian.net/2022/04/12/node-http-signature_1.3.6-1_unstable.log

All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20220412;users=lucas@debian.org
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20220412&fusertaguser=lucas@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

If you reassign this bug to another package, please marking it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.



More information about the Pkg-javascript-devel mailing list