[DRE-maint] Bug#1011682: ruby-json-jwt: FTBFS: ERROR: Test "ruby3.0" failed: Failure/Error: key.set_key n, e, d

Lucas Nussbaum lucas at debian.org
Thu May 26 07:09:09 BST 2022


Source: ruby-json-jwt
Version: 1.13.0-1
Severity: serious
Justification: FTBFS
Tags: bookworm sid ftbfs
User: lucas at debian.org
Usertags: ftbfs-20220525 ftbfs-bookworm

Hi,

During a rebuild of all packages in sid, your package failed to build
on amd64.


Relevant part (hopefully):
>        Failure/Error: key.set_key n, e, d
> 
>        OpenSSL::PKey::PKeyError:
>          rsa#set_key= is incompatible with OpenSSL 3.0
>        # ./lib/json/jwk.rb:106:in `set_key'
>        # ./lib/json/jwk.rb:106:in `to_rsa_key'
>        # ./lib/json/jwk.rb:43:in `to_key'
>        # ./lib/json/jose.rb:27:in `with_jwk_support'
>        # ./lib/json/jws.rb:100:in `sign'
>        # ./lib/json/jws.rb:17:in `sign!'
>        # ./lib/json/jwt.rb:35:in `sign'
>        # ./spec/json/jwt_spec.rb:130:in `block (4 levels) in <top (required)>'
> 
> Finished in 0.7193 seconds (files took 0.45001 seconds to load)
> 380 examples, 117 failures, 6 pending
> 
> Failed examples:
> 
> rspec ./spec/interop/with_jsrsasign_spec.rb:41 # interop with jsrsasign JWS verify should succeed
> rspec ./spec/json/jwk_spec.rb:105 # JSON::JWK when RSA public key given #to_key 
> rspec ./spec/json/jwk_spec.rb:139 # JSON::JWK when EC public key given unknown curve 
> rspec ./spec/json/jwk_spec.rb:160 # JSON::JWK when EC public key given #to_key 
> rspec ./spec/json/jwk_spec.rb:187 # JSON::JWK unknown key type 
> rspec './spec/json/jws_spec.rb[1:4:4:2:1:1]' # JSON::JWS#sign! RS256 when JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:4:2:1:2:1]' # JSON::JWS#sign! RS256 when JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:4:2:2:1]' # JSON::JWS#sign! RS256 when JSON::JWK key given behaves like generate_expected_signature 
> rspec './spec/json/jws_spec.rb[1:4:4:2:2:2:1]' # JSON::JWS#sign! RS256 when JSON::JWK key given behaves like generate_expected_signature with blank payload 
> rspec './spec/json/jws_spec.rb[1:4:5:2:1:1]' # JSON::JWS#sign! RS384 when JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:5:2:1:2:1]' # JSON::JWS#sign! RS384 when JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:5:2:2:1]' # JSON::JWS#sign! RS384 when JSON::JWK key given behaves like generate_expected_signature 
> rspec './spec/json/jws_spec.rb[1:4:5:2:2:2:1]' # JSON::JWS#sign! RS384 when JSON::JWK key given behaves like generate_expected_signature with blank payload 
> rspec './spec/json/jws_spec.rb[1:4:6:2:1:1]' # JSON::JWS#sign! RS512 when JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:6:2:1:2:1]' # JSON::JWS#sign! RS512 when JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:6:2:2:1]' # JSON::JWS#sign! RS512 when JSON::JWK key given behaves like generate_expected_signature 
> rspec './spec/json/jws_spec.rb[1:4:6:2:2:2:1]' # JSON::JWS#sign! RS512 when JSON::JWK key given behaves like generate_expected_signature with blank payload 
> rspec './spec/json/jws_spec.rb[1:4:7:1:1:1]' # JSON::JWS#sign! ES256 when OpenSSL::PKey::EC key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:7:1:1:2:1]' # JSON::JWS#sign! ES256 when OpenSSL::PKey::EC key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:7:1:2:1]' # JSON::JWS#sign! ES256 when OpenSSL::PKey::EC key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:7:2:1:1]' # JSON::JWS#sign! ES256 when JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:7:2:1:2:1]' # JSON::JWS#sign! ES256 when JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:7:2:2:1]' # JSON::JWS#sign! ES256 when JSON::JWK key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:8:1:1:1]' # JSON::JWS#sign! ES384 when OpenSSL::PKey::EC key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:8:1:1:2:1]' # JSON::JWS#sign! ES384 when OpenSSL::PKey::EC key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:8:1:2:1]' # JSON::JWS#sign! ES384 when OpenSSL::PKey::EC key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:8:2:1:1]' # JSON::JWS#sign! ES384 when JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:8:2:1:2:1]' # JSON::JWS#sign! ES384 when JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:8:2:2:1]' # JSON::JWS#sign! ES384 when JSON::JWK key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:9:1:1:1]' # JSON::JWS#sign! ES512 when OpenSSL::PKey::EC key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:9:1:1:2:1]' # JSON::JWS#sign! ES512 when OpenSSL::PKey::EC key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:9:1:2:1]' # JSON::JWS#sign! ES512 when OpenSSL::PKey::EC key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:9:2:1:1]' # JSON::JWS#sign! ES512 when JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:9:2:1:2:1]' # JSON::JWS#sign! ES512 when JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:9:2:2:1]' # JSON::JWS#sign! ES512 when JSON::JWK key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:10:1:1:1]' # JSON::JWS#sign! ES256K when OpenSSL::PKey::EC key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:10:1:1:2:1]' # JSON::JWS#sign! ES256K when OpenSSL::PKey::EC key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:10:1:2:1]' # JSON::JWS#sign! ES256K when OpenSSL::PKey::EC key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:4:10:2:1:1]' # JSON::JWS#sign! ES256K when JSON::JWK key given behaves like jwt_with_alg 
> rspec './spec/json/jws_spec.rb[1:4:10:2:1:2:1]' # JSON::JWS#sign! ES256K when JSON::JWK key given behaves like jwt_with_alg header 
> rspec './spec/json/jws_spec.rb[1:4:10:2:2:1]' # JSON::JWS#sign! ES256K when JSON::JWK key given behaves like self_verifiable should be self-verifiable
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:2:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:3:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:2:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:4:2:1:4:3:1]' # JSON::JWS#verify! RS256 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:2:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:3:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:2:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:5:2:1:4:3:1]' # JSON::JWS#verify! RS384 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:2:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:3:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:2:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:6:2:1:4:3:1]' # JSON::JWS#verify! RS512 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:2:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:3:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:2:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:1:1:4:3:1]' # JSON::JWS#verify! ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:2:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:3:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:2:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:7:2:1:4:3:1]' # JSON::JWS#verify! ES256 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:2:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:3:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:2:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:1:1:4:3:1]' # JSON::JWS#verify! ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:2:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:3:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:2:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:8:2:1:4:3:1]' # JSON::JWS#verify! ES384 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:2:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:3:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:2:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:1:1:4:3:1]' # JSON::JWS#verify! ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:2:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:3:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:2:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:9:2:1:4:3:1]' # JSON::JWS#verify! ES512 when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:2:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:3:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:2:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:1:1:4:3:1]' # JSON::JWS#verify! ES256K when OpenSSL::PKey::EC key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:2:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:3:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification claims should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification with blank payload is expected not to raise Exception
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:2:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification with blank payload header should be parsed successfully
> rspec './spec/json/jws_spec.rb[1:5:10:2:1:4:3:1]' # JSON::JWS#verify! ES256K when JSON::JWK key given behaves like success_signature_verification with blank payload claims should be parsed successfully
> rspec ./spec/json/jwt_spec.rb:67 # JSON::JWT#sign when no algirithm specified when key is EC key when prime256v1 alg 
> rspec ./spec/json/jwt_spec.rb:72 # JSON::JWT#sign when no algirithm specified when key is EC key when secp384r1 alg 
> rspec ./spec/json/jwt_spec.rb:77 # JSON::JWT#sign when no algirithm specified when key is EC key when secp521r1 alg 
> rspec ./spec/json/jwt_spec.rb:82 # JSON::JWT#sign when no algirithm specified when key is EC key when secp256k1 alg 
> rspec ./spec/json/jwt_spec.rb:93 # JSON::JWT#sign when no algirithm specified when key is JWK with kty=RSA alg 
> rspec ./spec/json/jwt_spec.rb:99 # JSON::JWT#sign when no algirithm specified when key is JWK with kty=EC when prime256v1 alg 
> rspec ./spec/json/jwt_spec.rb:104 # JSON::JWT#sign when no algirithm specified when key is JWK with kty=EC when secp384r1 alg 
> rspec ./spec/json/jwt_spec.rb:109 # JSON::JWT#sign when no algirithm specified when key is JWK with kty=EC when secp521r1 alg 
> rspec ./spec/json/jwt_spec.rb:114 # JSON::JWT#sign when no algirithm specified when key is JWK with kty=EC when secp256k1 alg 
> rspec ./spec/json/jwt_spec.rb:129 # JSON::JWT#sign when JWK is given should set kid header automatically
> 
> /usr/bin/ruby3.0 -I/usr/share/rubygems-integration/all/gems/rspec-support-3.10.3/lib:/usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/lib /usr/share/rubygems-integration/all/gems/rspec-core-3.10.1/exe/rspec --pattern ./spec/\*\*/\*_spec.rb --format documentation failed
> ERROR: Test "ruby3.0" failed: 


The full build log is available from:
http://qa-logs.debian.net/2022/05/25/ruby-json-jwt_1.13.0-1_unstable.log

All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20220525;users=lucas@debian.org
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20220525&fusertaguser=lucas@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

If you reassign this bug to another package, please marking it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.



More information about the Pkg-ruby-extras-maintainers mailing list