[DRE-maint] Bug#1005426: ruby-jwt: FTBFS: ERROR: Test "ruby3.0" failed: Failure/Error: raise JWT::RequiredDependencyError, "You currently have OpenSSL #{OpenSSL::VERSION}. PS support requires >= 2.1"

Lucas Nussbaum lucas at debian.org
Sun Feb 13 07:06:47 GMT 2022


Source: ruby-jwt
Version: 2.2.2-1
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: lucas at debian.org
Usertags: ftbfs-20220212 ftbfs-bookworm

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.


Relevant part (hopefully):
>       Failure/Error: raise JWT::RequiredDependencyError, "You currently have OpenSSL #{OpenSSL::VERSION}. PS support requires >= 2.1"
> 
>       JWT::RequiredDependencyError:
>         You currently have OpenSSL 3.0.0. PS support requires >= 2.1
>       # ./lib/jwt/algos/ps.rb:35:in `require_openssl!'
>       # ./lib/jwt/algos/ps.rb:11:in `sign'
>       # ./lib/jwt/signature.rb:37:in `sign'
>       # ./lib/jwt/encode.rb:57:in `encode_signature'
>       # ./lib/jwt/encode.rb:34:in `encoded_signature'
>       # ./lib/jwt/encode.rb:20:in `segments'
>       # ./lib/jwt.rb:24:in `encode'
>       # ./spec/jwt_spec.rb:225:in `block (4 levels) in <top (required)>'
> 
> Finished in 0.80869 seconds (files took 0.13885 seconds to load)
> 160 examples, 13 failures
> 
> Failed examples:
> 
> rspec ./spec/integration/readme_examples_spec.rb:71 # README.md code test algorithm usage RSASSA-PSS
> rspec './spec/jwt_spec.rb[1:14:2]' # JWT alg: PS256 should decode a valid token
> rspec './spec/jwt_spec.rb[1:14:4]' # JWT alg: PS256 wrong key and verify = false should not raise JWT::DecodeError
> rspec './spec/jwt_spec.rb[1:14:3]' # JWT alg: PS256 wrong key should raise JWT::DecodeError
> rspec './spec/jwt_spec.rb[1:14:1]' # JWT alg: PS256 should generate a valid token
> rspec './spec/jwt_spec.rb[1:15:1]' # JWT alg: PS384 should generate a valid token
> rspec './spec/jwt_spec.rb[1:15:4]' # JWT alg: PS384 wrong key and verify = false should not raise JWT::DecodeError
> rspec './spec/jwt_spec.rb[1:15:2]' # JWT alg: PS384 should decode a valid token
> rspec './spec/jwt_spec.rb[1:15:3]' # JWT alg: PS384 wrong key should raise JWT::DecodeError
> rspec './spec/jwt_spec.rb[1:16:2]' # JWT alg: PS512 should decode a valid token
> rspec './spec/jwt_spec.rb[1:16:3]' # JWT alg: PS512 wrong key should raise JWT::DecodeError
> rspec './spec/jwt_spec.rb[1:16:1]' # JWT alg: PS512 should generate a valid token
> rspec './spec/jwt_spec.rb[1:16:4]' # JWT alg: PS512 wrong key and verify = false should not raise JWT::DecodeError
> 
> Randomized with seed 63633
> 
> /usr/bin/ruby3.0 -I/usr/share/rubygems-integration/all/gems/rspec-support-3.10.3/lib:/usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/lib /usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/exe/rspec --pattern ./spec/\*\*/\*_spec.rb failed
> ERROR: Test "ruby3.0" failed: 


The full build log is available from:
http://qa-logs.debian.net/2022/02/12/ruby-jwt_2.2.2-1_unstable.log

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

If you reassign this bug to another package, please marking it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.



More information about the Pkg-ruby-extras-maintainers mailing list