[Pkg-javascript-devel] Bug#1123414: node-crypto-browserify: FTBFS: dh_auto_test: error: /bin/sh -ex debian/tests/pkg-js/test returned exit code 1

Santiago Vila sanvila at debian.org
Tue Dec 16 20:27:51 GMT 2025


Package: src:node-crypto-browserify
Version: 3.12.0-7
Severity: serious
Tags: ftbfs forky sid

Dear maintainer:

During a rebuild of all packages in unstable, this package failed to build.

Below you will find the last part of the build log (probably the most
relevant part, but not necessarily). If required, the full build log
is available here:

https://people.debian.org/~sanvila/build-logs/202512/

About the archive rebuild: The build was made on virtual machines from AWS,
using sbuild and a reduced chroot with only build-essential packages.

If you cannot reproduce the bug please contact me privately, as I
am willing to provide ssh access to a virtual machine where the bug is
fully reproducible.

If this is really a bug in one of the build-depends, please use
reassign and add an affects on src:node-crypto-browserify, so that this is still
visible in the BTS web page for this package.

Thanks.

--------------------------------------------------------------------------------
[...]
 debian/rules clean
dh clean
   dh_auto_clean --buildsystem=nodejs
	rm -rf ./node_modules/.cache ./.nyc_output
rm ./node_modules/.cache
rm ./node_modules/.cache
   dh_clean
 debian/rules binary
dh binary
   dh_update_autotools_config
   dh_autoreconf
   dh_auto_configure --buildsystem=nodejs
   dh_auto_build --buildsystem=nodejs
No build command found, searching known files
   dh_auto_test --buildsystem=nodejs
	mkdir -p node_modules
	ln -s ../. node_modules/crypto-browserify
	/bin/sh -ex debian/tests/pkg-js/test
+ node test/index.js
(node:52) [DEP0005] DeprecationWarning: Buffer() is deprecated due to security and usability issues. Please use the Buffer.alloc(), Buffer.allocUnsafe(), or Buffer.from() methods instead.
(Use `node --trace-deprecation ...` to show where the warning was created)
TAP version 13
# createHash in crypto-browserify test sha1 against test vectors
# createHash in crypto-browserify test sha224 against test vectors
# createHash in crypto-browserify test sha256 against test vectors
# createHash in crypto-browserify test sha384 against test vectors
# createHash in crypto-browserify test sha512 against test vectors
# createHash in crypto-browserify test md5 against test vectors
# create-hash/browser test sha1 against test vectors
# create-hash/browser test sha224 against test vectors
# create-hash/browser test sha256 against test vectors
# create-hash/browser test sha384 against test vectors
# create-hash/browser test sha512 against test vectors
# create-hash/browser test md5 against test vectors
# createHmac in crypto-browserify hmac(sha1)
# hmac(sha1)
# createHmac in crypto-browserify hmac(sha224)
# hmac(sha224)
# createHmac in crypto-browserify hmac(sha256)
# hmac(sha256)
# createHmac in crypto-browserify hmac(sha384)
# hmac(sha384)
# createHmac in crypto-browserify hmac(sha512)
# hmac(sha512)
# createHmac in crypto-browserify hmac(md5)
# hmac(md5)
# create-hmac/browser hmac(sha1)
# hmac(sha1)
# create-hmac/browser hmac(sha224)
# hmac(sha224)
# create-hmac/browser hmac(sha256)
# hmac(sha256)
# create-hmac/browser hmac(sha384)
# hmac(sha384)
# create-hmac/browser hmac(sha512)
# hmac(sha512)
# create-hmac/browser hmac(md5)
# hmac(md5)
# pbkdf2
ok 1 should be strictly equal
ok 2 should be strictly equal
ok 3 should be strictly equal
ok 4 should be strictly equal
ok 5 should be strictly equal
# createECDH: secp256k1 uncompressed
ok 6 diff public keys
ok 7 equal secrets
# createECDH: secp256k1 compressed
ok 8 diff public keys
ok 9 equal secrets
# createECDH: secp256k1 set stuff
ok 10 same private key
ok 11 same public keys, uncompressed
ok 12 same public keys compressed
ok 13 same public keys hybrid
ok 14 equal secrets
# createECDH: secp224r1 uncompressed
ok 15 diff public keys
ok 16 equal secrets
# createECDH: secp224r1 compressed
ok 17 diff public keys
ok 18 equal secrets
# createECDH: secp224r1 set stuff
ok 19 same private key
ok 20 same public keys, uncompressed
ok 21 same public keys compressed
ok 22 same public keys hybrid
ok 23 equal secrets
# createECDH: prime256v1 uncompressed
ok 24 diff public keys
ok 25 equal secrets
# createECDH: prime256v1 compressed
ok 26 diff public keys
ok 27 equal secrets
# createECDH: prime256v1 set stuff
ok 28 same private key
ok 29 same public keys, uncompressed
ok 30 same public keys compressed
ok 31 same public keys hybrid
ok 32 equal secrets
# createECDH: prime192v1 uncompressed
ok 33 diff public keys
ok 34 equal secrets
# createECDH: prime192v1 compressed
ok 35 diff public keys
ok 36 equal secrets
# createECDH: prime192v1 set stuff
ok 37 same private key
ok 38 same public keys, uncompressed
ok 39 same public keys compressed
ok 40 same public keys hybrid
ok 41 equal secrets
# publicEncrypt/privateDecrypt
# can decrypt
ok 42 decrypt it properly
ok 43 decrypt it properly
# can round trip
ok 44 round trip it
ok 45 round trip it
# privateEncrypt/publicDecrypt
# can round trip
ok 46 round trip it
ok 47 round trip it
# get error message
ok 48 should be truthy
# randomBytes
ok 49 should be strictly equal
ok 50 should be truthy
ok 51 null
ok 52 should be strictly equal
ok 53 should be truthy
# randomBytes seem random
[116.77199928749558,126.068,139.22800071250444]
ok 54 should be truthy
ok 55 should be truthy
# get error message
ok 56 should be truthy
# pseudoRandomBytes
ok 57 should be strictly equal
ok 58 should be truthy
ok 59 null
ok 60 should be strictly equal
ok 61 should be truthy
# pseudoRandomBytes seem random
[116.58413384801662,130.322,139.41586615198338]
ok 62 should be truthy
ok 63 should be truthy
# rsa with sha256
# js sign and verify
ok 64 validates
# node sign and verify
ok 65 validates
# node sign and js verify
ok 66 validates
# js sign and node verify
ok 67 validates
# ec with sha1
# js sign and verify
ok 68 validates
# node sign and verify
skipping unsupported scheme ecdsa-with-SHA1
# node sign and js verify
skipping unsupported scheme ecdsa-with-SHA1
# js sign and node verify
skipping unsupported scheme ecdsa-with-SHA1
# get error message
ok 69 should be truthy
# randomfill
ok 70 should be strictly equal
ok 71 should be truthy
ok 72 null
ok 73 should be strictly equal
ok 74 should be truthy
# seems random
[116.44837673744507,133.44,139.55162326255493]
ok 75 should be truthy
ok 76 should be truthy
# run: 1
# ciphers: des3
ok 77 should be strictly equal
# run: 1
# ciphers: des-ede3-cbc
ok 78 should be strictly equal
# run: 1
# ciphers: des-ede3
ok 79 should be strictly equal
# run: 1
# ciphers: des-ede-cbc
ok 80 should be strictly equal
# run: 1
# ciphers: des-ede
ok 81 should be strictly equal
# run: 1
# ciphers: aes-128-ecb
ok 82 should be strictly equal
# run: 1
# ciphers: aes-192-ecb
ok 83 should be strictly equal
# run: 1
# ciphers: aes-256-ecb
ok 84 should be strictly equal
# run: 1
# ciphers: aes-128-cbc
ok 85 should be strictly equal
# run: 1
# ciphers: aes-192-cbc
ok 86 should be strictly equal
# run: 1
# ciphers: aes-256-cbc
ok 87 should be strictly equal
# run: 1
# ciphers: aes128
ok 88 should be strictly equal
# run: 1
# ciphers: aes192
ok 89 should be strictly equal
# run: 1
# ciphers: aes256
ok 90 should be strictly equal
# run: 1
# ciphers: aes-128-cfb
ok 91 should be strictly equal
# run: 1
# ciphers: aes-192-cfb
ok 92 should be strictly equal
# run: 1
# ciphers: aes-256-cfb
ok 93 should be strictly equal
# run: 1
# ciphers: aes-128-cfb8
ok 94 should be strictly equal
# run: 1
# ciphers: aes-192-cfb8
ok 95 should be strictly equal
# run: 1
# ciphers: aes-256-cfb8
ok 96 should be strictly equal
# run: 1
# ciphers: aes-128-cfb1
ok 97 should be strictly equal
# run: 1
# ciphers: aes-192-cfb1
ok 98 should be strictly equal
# run: 1
# ciphers: aes-256-cfb1
ok 99 should be strictly equal
# run: 1
# ciphers: aes-128-ofb
ok 100 should be strictly equal
# run: 1
# ciphers: aes-192-ofb
ok 101 should be strictly equal
# run: 1
# ciphers: aes-256-ofb
ok 102 should be strictly equal
# run: 1
# ciphers: aes-128-ctr
ok 103 should be strictly equal
# run: 1
# ciphers: aes-192-ctr
ok 104 should be strictly equal
# run: 1
# ciphers: aes-256-ctr
ok 105 should be strictly equal
# run: 1
# ciphers: aes-128-gcm
ok 106 should be strictly equal
# run: 1
# ciphers: aes-192-gcm
ok 107 should be strictly equal
# run: 1
# ciphers: aes-256-gcm
ok 108 should be strictly equal
# getCiphers
ok 109 get ciphers returns an array
# through crypto browserify works
/<<PKGBUILDDIR>>/test/aes.js:41
  var crypter = crypto.createCipher(cipher, password)
                       ^

TypeError: crypto.createCipher is not a function
    at Test.<anonymous> (/<<PKGBUILDDIR>>/test/aes.js:41:24)
    at Test.bound [as _cb] (/usr/share/nodejs/tape/lib/test.js:95:17)
    at Test.run (/usr/share/nodejs/tape/lib/test.js:115:28)
    at Test.bound [as run] (/usr/share/nodejs/tape/lib/test.js:95:17)
    at Immediate.next (/usr/share/nodejs/tape/lib/results.js:157:7)
    at process.processImmediate (node:internal/timers:485:21)

Node.js v22.21.1
dh_auto_test: error: /bin/sh -ex debian/tests/pkg-js/test returned exit code 1
make: *** [debian/rules:8: binary] Error 25
dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2
--------------------------------------------------------------------------------



More information about the Pkg-javascript-devel mailing list