Input buildinfo: https://buildinfos.debian.net/buildinfo-pool/r/ruby-json-jwt/ruby-json-jwt_1.11.0-1_all.buildinfo Use metasnap for getting required timestamps New buildinfo file: /tmp/ruby-json-jwt-1.11.0-1sprmtdps/ruby-json-jwt_1.11.0-1_all.buildinfo Get source package info: ruby-json-jwt=1.11.0-1 Source URL: http://snapshot.notset.fr/mr/package/ruby-json-jwt/1.11.0-1/srcfiles?fileinfo=1 env -i PATH=/usr/sbin:/usr/bin:/sbin:/bin TMPDIR=/tmp mmdebstrap --arch=amd64 --include=adduser=3.118 autoconf=2.69-11.1 automake=1:1.16.1-4 autopoint=0.19.8.1-10 autotools-dev=20180224.1 base-files=11 base-passwd=3.5.47 bash=5.0-5 binutils=2.33.50.20200115-2 binutils-common=2.33.50.20200115-2 binutils-x86-64-linux-gnu=2.33.50.20200115-2 bsdmainutils=11.1.2+b1 bsdutils=1:2.34-0.1 build-essential=12.8 bzip2=1.0.8-2 ca-certificates=20190110 coreutils=8.30-3+b1 cpp=4:9.2.1-3.1 cpp-9=9.2.1-24 dash=0.5.10.2-6 debconf=1.5.73 debhelper=12.8 debianutils=4.9.1 devscripts=2.19.7 dh-autoreconf=19 dh-strip-nondeterminism=1.6.3-1 diffutils=1:3.7-3 dirmngr=2.2.19-1 dpkg=1.19.7 dpkg-dev=1.19.7 dwz=0.13-5 fakeroot=1.24-1 fdisk=2.34-0.1 file=1:5.38-4 findutils=4.7.0-1 g++=4:9.2.1-3.1 g++-9=9.2.1-24 gcc=4:9.2.1-3.1 gcc-9=9.2.1-24 gcc-9-base=9.2.1-24 gem2deb=1.0.3 gem2deb-test-runner=1.0.3 gettext=0.19.8.1-10 gettext-base=0.19.8.1-10 gnupg=2.2.19-1 gnupg-l10n=2.2.19-1 gnupg-utils=2.2.19-1 gpg=2.2.19-1 gpg-agent=2.2.19-1 gpg-wks-client=2.2.19-1 gpg-wks-server=2.2.19-1 gpgconf=2.2.19-1 gpgsm=2.2.19-1 gpgv=2.2.19-1 grep=3.3-1 groff-base=1.22.4-4 gzip=1.9-3+b1 hostname=3.23 init-system-helpers=1.57 intltool-debian=0.35.0+20060710.5 libacl1=2.2.53-5 libarchive-zip-perl=1.67-1 libasan5=9.2.1-24 libassuan0=2.5.3-7 libatomic1=9.2.1-24 libattr1=1:2.4.48-5 libaudit-common=1:2.8.5-2 libaudit1=1:2.8.5-2+b1 libb-hooks-op-check-perl=0.22-1+b2 libbinutils=2.33.50.20200115-2 libblkid1=2.34-0.1 libbsd0=0.10.0-1 libbz2-1.0=1.0.8-2 libc-bin=2.29-9 libc-dev-bin=2.29-9 libc6=2.29-9 libc6-dev=2.29-9 libcap-ng0=0.7.9-2.1+b1 libcc1-0=9.2.1-24 libclass-method-modifiers-perl=2.13-1 libcroco3=0.6.13-1 libcrypt-dev=1:4.4.10-10 libcrypt1=1:4.4.10-10 libctf-nobfd0=2.33.50.20200115-2 libctf0=2.33.50.20200115-2 libdb5.3=5.3.28+dfsg1-0.6 libdebconfclient0=0.250 libdebhelper-perl=12.8 libdevel-callchecker-perl=0.008-1+b1 libdpkg-perl=1.19.7 libdynaloader-functions-perl=0.003-1 libelf1=0.176-1.1 libencode-locale-perl=1.05-1 libexpat1=2.2.9-1 libfakeroot=1.24-1 libfdisk1=2.34-0.1 libffi7=3.3-3 libfile-homedir-perl=1.004-1 libfile-listing-perl=6.04-1 libfile-stripnondeterminism-perl=1.6.3-1 libfile-which-perl=1.23-1 libgcc-9-dev=9.2.1-24 libgcc1=1:9.2.1-24 libgcrypt20=1.8.5-3 libgdbm-compat4=1.18.1-5 libgdbm6=1.18.1-5 libglib2.0-0=2.62.4-1+b1 libgmp-dev=2:6.1.2+dfsg-4 libgmp10=2:6.1.2+dfsg-4 libgmpxx4ldbl=2:6.1.2+dfsg-4 libgnutls30=3.6.11.1-2 libgomp1=9.2.1-24 libgpg-error0=1.36-7 libhogweed5=3.5.1+really3.5.1-2 libhtml-parser-perl=3.72-3+b4 libhtml-tagset-perl=3.20-4 libhtml-tree-perl=5.07-2 libhttp-cookies-perl=6.08-1 libhttp-date-perl=6.05-1 libhttp-message-perl=6.18-1 libhttp-negotiate-perl=6.01-1 libicu63=63.2-2 libidn2-0=2.2.0-2 libimport-into-perl=1.002005-1 libio-html-perl=1.001-1 libio-pty-perl=1:1.12-1 libio-socket-ssl-perl=2.066-1 libipc-run-perl=20180523.0-2 libisl22=0.22-2 libitm1=9.2.1-24 libksba8=1.3.5-2 libldap-2.4-2=2.4.48+dfsg-1+b2 libldap-common=2.4.48+dfsg-1 liblsan0=9.2.1-24 liblwp-mediatypes-perl=6.04-1 liblwp-protocol-https-perl=6.07-2 liblz4-1=1.9.2-2 liblzma5=5.2.4-1+b1 libmagic-mgc=1:5.38-4 libmagic1=1:5.38-4 libmodule-runtime-perl=0.016-1 libmoo-perl=2.003006-1 libmount1=2.34-0.1 libmpc3=1.1.0-1 libmpdec2=2.4.2-2 libmpfr6=4.0.2-1 libncursesw6=6.1+20191019-1 libnet-http-perl=6.19-1 libnet-ssleay-perl=1.88-2 libnettle7=3.5.1+really3.5.1-2 libnpth0=1.6-1 libp11-kit0=0.23.18.1-2+b1 libpam-modules=1.3.1-5 libpam-modules-bin=1.3.1-5 libpam-runtime=1.3.1-5 libpam0g=1.3.1-5 libparams-classify-perl=0.015-1+b2 libpcre2-8-0=10.34-7 libpcre3=2:8.39-12+b1 libperl5.30=5.30.0-9 libpipeline1=1.5.2-2 libpython3-stdlib=3.7.5-3 libpython3.7-minimal=3.7.6-1+b1 libpython3.7-stdlib=3.7.6-1+b1 libquadmath0=9.2.1-24 libreadline8=8.0-3 librole-tiny-perl=2.001004-1 libruby2.5=2.5.7-1+b1 libsasl2-2=2.1.27+dfsg-2 libsasl2-modules-db=2.1.27+dfsg-2 libseccomp2=2.4.2-2 libselinux1=3.0-1 libsemanage-common=3.0-1 libsemanage1=3.0-1 libsepol1=3.0-1 libsigsegv2=2.12-2 libsmartcols1=2.34-0.1 libsqlite3-0=3.30.1+fossil191229-1 libssl1.1=1.1.1d-2 libstdc++-9-dev=9.2.1-24 libstdc++6=9.2.1-24 libstrictures-perl=2.000006-1 libsub-override-perl=0.09-2 libsub-quote-perl=2.006006-1 libsystemd0=244-3 libtasn1-6=4.15.0-2 libtimedate-perl=2.3100-1 libtinfo6=6.1+20191019-1 libtool=2.4.6-11 libtry-tiny-perl=0.30-1 libtsan0=9.2.1-24 libubsan1=9.2.1-24 libuchardet0=0.0.6-3 libudev1=244-3 libunistring2=0.9.10-2 liburi-perl=1.76-1 libuuid1=2.34-0.1 libwww-perl=6.43-1 libwww-robotrules-perl=6.02-1 libxml2=2.9.4+dfsg1-8 libyaml-0-2=0.2.2-1 linux-libc-dev=5.4.13-1 login=1:4.8-1 lsb-base=11.1.0 m4=1.4.18-4 make=4.2.1-1.2 man-db=2.9.0-2 mawk=1.3.3-20 mime-support=3.64 ncurses-base=6.1+20191019-1 ncurses-bin=6.1+20191019-1 netbase=6.0 openssl=1.1.1d-2 passwd=1:4.8-1 patch=2.7.6-6 patchutils=0.3.4-2+b1 perl=5.30.0-9 perl-base=5.30.0-9 perl-modules-5.30=5.30.0-9 perl-openssl-defaults=3 pinentry-curses=1.1.0-3+b1 po-debconf=1.0.21 python3=3.7.5-3 python3-minimal=3.7.5-3 python3.7=3.7.6-1+b1 python3.7-minimal=3.7.6-1+b1 rake=12.3.3-1 readline-common=8.0-3 ruby=1:2.5.2 ruby-activesupport=2:5.2.3+dfsg-1 ruby-aes-key-wrap=1.0.1-1 ruby-all-dev=1:2.5.2 ruby-atomic=1.1.16-2+b8 ruby-bindata=2.3.5-1 ruby-concurrent=1.0.5-4 ruby-did-you-mean=1.2.1-1 ruby-diff-lcs=1.3-1 ruby-i18n=1.5.3-2 ruby-minitest=5.13.0-1 ruby-net-telnet=0.1.1-2 ruby-power-assert=1.1.1-1 ruby-rspec=3.8.0c0e1m0s0-1 ruby-rspec-core=3.8.0c0e1m0s0-1 ruby-rspec-expectations=3.8.0c0e1m0s0-1 ruby-rspec-its=1.3.0-1 ruby-rspec-mocks=3.8.0c0e1m0s0-1 ruby-rspec-support=3.8.0c0e1m0s0-1 ruby-setup=3.4.1-9 ruby-test-unit=3.3.4-1 ruby-thread-order=1.1.0-1 ruby-thread-safe=0.3.6-1 ruby-tzinfo=1.2.5-1 ruby-xmlrpc=0.3.0-2 ruby2.5=2.5.7-1+b1 ruby2.5-dev=2.5.7-1+b1 rubygems-integration=1.15 sed=4.7-1 sensible-utils=0.0.12+nmu1 sysvinit-utils=2.96-2.1 tar=1.30+dfsg-6+b1 tzdata=2019c-3 util-linux=2.34-0.1 wdiff=1.2.2-2+b1 xz-utils=5.2.4-1+b1 zlib1g=1:1.2.11.dfsg-1+b1 --variant=apt --aptopt=Acquire::Check-Valid-Until "false" --aptopt=Acquire::http::Dl-Limit "1000"; --aptopt=Acquire::https::Dl-Limit "1000"; --aptopt=Acquire::Retries "5"; --aptopt=APT::Get::allow-downgrades "true"; --keyring=/usr/share/keyrings/ --essential-hook=chroot "$1" sh -c "apt-get --yes install fakeroot util-linux" --essential-hook=copy-in /usr/share/keyrings/debian-archive-bullseye-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-security-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-stable.gpg /usr/share/keyrings/debian-archive-buster-automatic.gpg /usr/share/keyrings/debian-archive-buster-security-automatic.gpg /usr/share/keyrings/debian-archive-buster-stable.gpg /usr/share/keyrings/debian-archive-keyring.gpg /usr/share/keyrings/debian-archive-removed-keys.gpg /usr/share/keyrings/debian-archive-stretch-automatic.gpg /usr/share/keyrings/debian-archive-stretch-security-automatic.gpg /usr/share/keyrings/debian-archive-stretch-stable.gpg /usr/share/keyrings/debian-ports-archive-keyring-removed.gpg /usr/share/keyrings/debian-ports-archive-keyring.gpg /usr/share/keyrings/debian-keyring.gpg /etc/apt/trusted.gpg.d/ --essential-hook=chroot "$1" sh -c "rm /etc/apt/sources.list && echo 'deb http://snapshot.notset.fr/archive/debian/20210814T212851Z/ bookworm main deb-src http://snapshot.notset.fr/archive/debian/20210814T212851Z/ bookworm main deb http://snapshot.notset.fr/archive/debian/20200121T090303Z/ unstable main' >> /etc/apt/sources.list && apt-get update" --customize-hook=chroot "$1" useradd --no-create-home -d /nonexistent -p "" builduser -s /bin/bash --customize-hook=chroot "$1" env sh -c "apt-get source --only-source -d ruby-json-jwt=1.11.0-1 && mkdir -p /build/ruby-json-jwt-qh8AF9 && dpkg-source --no-check -x /*.dsc /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0 && chown -R builduser:builduser /build/ruby-json-jwt-qh8AF9" --customize-hook=chroot "$1" env --unset=TMPDIR runuser builduser -c "cd /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0 && env DEB_BUILD_OPTIONS="parallel=4" LANG="C.UTF-8" LC_ALL="C.UTF-8" SOURCE_DATE_EPOCH="1579598232" dpkg-buildpackage -uc -a amd64 --build=all" --customize-hook=sync-out /build/ruby-json-jwt-qh8AF9 /tmp/ruby-json-jwt-1.11.0-1sprmtdps bullseye /dev/null deb http://snapshot.notset.fr/archive/debian/20200121T090303Z unstable main I: automatically chosen mode: root I: chroot architecture amd64 is equal to the host's architecture I: automatically chosen format: tar I: using /tmp/mmdebstrap.t_CkrvsPxx as tempdir I: running apt-get update... I: downloading packages with apt... I: extracting archives... I: installing essential packages... I: running --essential-hook in shell: sh -c 'chroot "$1" sh -c "apt-get --yes install fakeroot util-linux"' exec /tmp/mmdebstrap.t_CkrvsPxx Reading package lists... Building dependency tree... util-linux is already the newest version (2.34-0.1). The following NEW packages will be installed: fakeroot libfakeroot 0 upgraded, 2 newly installed, 0 to remove and 0 not upgraded. Need to get 132 kB of archives. After this operation, 393 kB of additional disk space will be used. Get:1 http://snapshot.notset.fr/archive/debian/20200121T090303Z unstable/main amd64 libfakeroot amd64 1.24-1 [45.7 kB] Get:2 http://snapshot.notset.fr/archive/debian/20200121T090303Z unstable/main amd64 fakeroot amd64 1.24-1 [85.9 kB] debconf: delaying package configuration, since apt-utils is not installed Fetched 132 kB in 0s (1150 kB/s) Selecting previously unselected package libfakeroot:amd64. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 4508 files and directories currently installed.) Preparing to unpack .../libfakeroot_1.24-1_amd64.deb ... Unpacking libfakeroot:amd64 (1.24-1) ... Selecting previously unselected package fakeroot. Preparing to unpack .../fakeroot_1.24-1_amd64.deb ... Unpacking fakeroot (1.24-1) ... Setting up libfakeroot:amd64 (1.24-1) ... Setting up fakeroot (1.24-1) ... update-alternatives: using /usr/bin/fakeroot-sysv to provide /usr/bin/fakeroot (fakeroot) in auto mode Processing triggers for libc-bin (2.29-9) ... I: running special hook: copy-in /usr/share/keyrings/debian-archive-bullseye-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-security-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-stable.gpg /usr/share/keyrings/debian-archive-buster-automatic.gpg /usr/share/keyrings/debian-archive-buster-security-automatic.gpg /usr/share/keyrings/debian-archive-buster-stable.gpg /usr/share/keyrings/debian-archive-keyring.gpg /usr/share/keyrings/debian-archive-removed-keys.gpg /usr/share/keyrings/debian-archive-stretch-automatic.gpg /usr/share/keyrings/debian-archive-stretch-security-automatic.gpg /usr/share/keyrings/debian-archive-stretch-stable.gpg /usr/share/keyrings/debian-ports-archive-keyring-removed.gpg /usr/share/keyrings/debian-ports-archive-keyring.gpg /usr/share/keyrings/debian-keyring.gpg /etc/apt/trusted.gpg.d/ I: running --essential-hook in shell: sh -c 'chroot "$1" sh -c "rm /etc/apt/sources.list && echo 'deb http://snapshot.notset.fr/archive/debian/20210814T212851Z/ bookworm main deb-src http://snapshot.notset.fr/archive/debian/20210814T212851Z/ bookworm main deb http://snapshot.notset.fr/archive/debian/20200121T090303Z/ unstable main' >> /etc/apt/sources.list && apt-get update"' exec /tmp/mmdebstrap.t_CkrvsPxx Get:1 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm InRelease [81.6 kB] Hit:2 http://snapshot.notset.fr/archive/debian/20200121T090303Z unstable InRelease Ign:3 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main Sources Ign:4 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main amd64 Packages Ign:3 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main Sources Ign:4 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main amd64 Packages Ign:3 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main Sources Ign:4 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main amd64 Packages Get:3 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main Sources [11.4 MB] Get:4 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main amd64 Packages [11.1 MB] Fetched 22.6 MB in 22s (1005 kB/s) Reading package lists... I: installing remaining packages inside the chroot... I: running --customize-hook in shell: sh -c 'chroot "$1" useradd --no-create-home -d /nonexistent -p "" builduser -s /bin/bash' exec /tmp/mmdebstrap.t_CkrvsPxx I: running --customize-hook in shell: sh -c 'chroot "$1" env sh -c "apt-get source --only-source -d ruby-json-jwt=1.11.0-1 && mkdir -p /build/ruby-json-jwt-qh8AF9 && dpkg-source --no-check -x /*.dsc /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0 && chown -R builduser:builduser /build/ruby-json-jwt-qh8AF9"' exec /tmp/mmdebstrap.t_CkrvsPxx Reading package lists... NOTICE: 'ruby-json-jwt' packaging is maintained in the 'Git' version control system at: https://salsa.debian.org/ruby-team/ruby-json-jwt.git Please use: git clone https://salsa.debian.org/ruby-team/ruby-json-jwt.git to retrieve the latest (possibly unreleased) updates to the package. Need to get 29.9 kB of source archives. Get:1 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main ruby-json-jwt 1.11.0-1 (dsc) [1783 B] Get:2 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main ruby-json-jwt 1.11.0-1 (tar) [25.4 kB] Get:3 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main ruby-json-jwt 1.11.0-1 (diff) [2672 B] Fetched 29.9 kB in 0s (471 kB/s) Download complete and in download only mode W: Download is performed unsandboxed as root as file 'ruby-json-jwt_1.11.0-1.dsc' couldn't be accessed by user '_apt'. - pkgAcquire::Run (13: Permission denied) dpkg-source: info: extracting ruby-json-jwt in /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0 dpkg-source: info: unpacking ruby-json-jwt_1.11.0.orig.tar.gz dpkg-source: info: unpacking ruby-json-jwt_1.11.0-1.debian.tar.xz dpkg-source: info: using patch list from debian/patches/series dpkg-source: info: applying 001-remove-simplecov.patch I: running --customize-hook in shell: sh -c 'chroot "$1" env --unset=TMPDIR runuser builduser -c "cd /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0 && env DEB_BUILD_OPTIONS="parallel=4" LANG="C.UTF-8" LC_ALL="C.UTF-8" SOURCE_DATE_EPOCH="1579598232" dpkg-buildpackage -uc -a amd64 --build=all"' exec /tmp/mmdebstrap.t_CkrvsPxx dpkg-buildpackage: info: source package ruby-json-jwt dpkg-buildpackage: info: source version 1.11.0-1 dpkg-buildpackage: info: source distribution unstable dpkg-buildpackage: info: source changed by Cédric Boutillier dpkg-source --before-build . fakeroot debian/rules clean dh clean --buildsystem=ruby --with ruby dh_auto_clean -O--buildsystem=ruby dh_ruby --clean dh_ruby --clean Invalid gemspec in [json-jwt.gemspec]: No such file or directory - git dh_autoreconf_clean -O--buildsystem=ruby dh_clean -O--buildsystem=ruby debian/rules build-indep dh build-indep --buildsystem=ruby --with ruby dh_update_autotools_config -i -O--buildsystem=ruby dh_autoreconf -i -O--buildsystem=ruby dh_auto_configure -i -O--buildsystem=ruby dh_ruby --configure dh_auto_build -i -O--buildsystem=ruby dh_ruby --build dh_ruby --build dh_auto_test -i -O--buildsystem=ruby dh_ruby --test create-stamp debian/debhelper-build-stamp fakeroot debian/rules binary-indep dh binary-indep --buildsystem=ruby --with ruby dh_testroot -i -O--buildsystem=ruby dh_prep -i -O--buildsystem=ruby dh_auto_install -i -O--buildsystem=ruby dh_ruby --install /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/debian/ruby-json-jwt dh_ruby --install Invalid gemspec in [json-jwt.gemspec]: No such file or directory - git ┌──────────────────────────────────────────────────────────────────────────────┐ │ Install files │ └──────────────────────────────────────────────────────────────────────────────┘ install -d /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/debian/ruby-json-jwt/usr/lib/ruby/vendor_ruby install -D -m644 /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/lib/json/jwk/jwkizable.rb /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/debian/ruby-json-jwt/usr/lib/ruby/vendor_ruby/json/jwk/jwkizable.rb install -D -m644 /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/lib/json/jwk/set.rb /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/debian/ruby-json-jwt/usr/lib/ruby/vendor_ruby/json/jwk/set.rb install -D -m644 /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/lib/json/jwk.rb /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/debian/ruby-json-jwt/usr/lib/ruby/vendor_ruby/json/jwk.rb install -D -m644 /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/lib/json/jws.rb /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/debian/ruby-json-jwt/usr/lib/ruby/vendor_ruby/json/jws.rb install -D -m644 /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/lib/json/jwt.rb /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/debian/ruby-json-jwt/usr/lib/ruby/vendor_ruby/json/jwt.rb install -D -m644 /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/lib/json/jwe.rb /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/debian/ruby-json-jwt/usr/lib/ruby/vendor_ruby/json/jwe.rb install -D -m644 /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/lib/json/jose.rb /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/debian/ruby-json-jwt/usr/lib/ruby/vendor_ruby/json/jose.rb ┌──────────────────────────────────────────────────────────────────────────────┐ │ Install Rubygems integration metadata │ └──────────────────────────────────────────────────────────────────────────────┘ generating gemspec at /build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/debian/ruby-json-jwt/usr/share/rubygems-integration/all/specifications/json-jwt-1.11.0.gemspec /usr/bin/ruby2.5 /usr/bin/gem2deb-test-runner ┌──────────────────────────────────────────────────────────────────────────────┐ │ Checking Rubygems dependency resolution on ruby2.5 │ └──────────────────────────────────────────────────────────────────────────────┘ Invalid gemspec in [json-jwt.gemspec]: No such file or directory - git GEM_PATH=debian/ruby-json-jwt/usr/share/rubygems-integration/all:/var/lib/gems/2.5.0:/usr/lib/ruby/gems/2.5.0:/usr/share/rubygems-integration/2.5.0:/usr/share/rubygems-integration/all:/usr/lib/x86_64-linux-gnu/rubygems-integration/2.5.0 ruby2.5 -e gem\ \"json-jwt\" ┌──────────────────────────────────────────────────────────────────────────────┐ │ Run tests for ruby2.5 from debian/ruby-tests.rake │ └──────────────────────────────────────────────────────────────────────────────┘ RUBYLIB=/build/ruby-json-jwt-qh8AF9/ruby-json-jwt-1.11.0/debian/ruby-json-jwt/usr/lib/ruby/vendor_ruby:. GEM_PATH=debian/ruby-json-jwt/usr/share/rubygems-integration/all:/var/lib/gems/2.5.0:/usr/lib/ruby/gems/2.5.0:/usr/share/rubygems-integration/2.5.0:/usr/share/rubygems-integration/all:/usr/lib/x86_64-linux-gnu/rubygems-integration/2.5.0 ruby2.5 -S rake -f debian/ruby-tests.rake /usr/bin/ruby2.5 /usr/bin/rspec --pattern ./spec/\*\*/\*_spec.rb --format documentation interop with jsrsasign JWS verify should succeed interop with Nimbus JOSE Nimbus JOSE unavailable (PENDING: No reason given) interop with RFC Example JWK Thubmprint thumbprint should == "NzbLsXh8uDCcd-6MNwXF4W_7noWXFZAfHkxZsRGC9Xs" JSON::JWE #content_type should == "application/jose" encrypt! when plaintext given when alg=dir TODO (PENDING: Not yet implemented) when alg=A128KW TODO (PENDING: Not yet implemented) when alg=A256KW TODO (PENDING: Not yet implemented) when unknonw/unsupported algorithm given when alg=unknown behaves like unexpected_algorithm_for_encryption should raise JSON::JWE::UnexpectedAlgorithm when enc=unknown behaves like unexpected_algorithm_for_encryption should raise JSON::JWE::UnexpectedAlgorithm when alg=ECDH-ES behaves like unsupported_algorithm_for_encryption should raise NotImplementedError when alg=ECDH-ES+A128KW behaves like unsupported_algorithm_for_encryption should raise NotImplementedError when alg=ECDH-ES+A256KW behaves like unsupported_algorithm_for_encryption should raise NotImplementedError decrypt! when alg=RSA1_5 when enc=A128GCM behaves like decryptable should == "Hello World" behaves like verify_gcm_authentication_tag should raise JSON::JWE::DecryptionFailed when enc=A256GCM behaves like decryptable should == "Hello World" behaves like verify_gcm_authentication_tag should raise JSON::JWE::DecryptionFailed when enc=A128CBC-HS256 behaves like decryptable should == "Hello World" when enc=A256CBC-HS512 behaves like decryptable should == "Hello World" when alg=RSA-OAEP when enc=A128GCM behaves like decryptable should == "Hello World" behaves like verify_gcm_authentication_tag should raise JSON::JWE::DecryptionFailed when enc=A256GCM behaves like decryptable should == "Hello World" behaves like verify_gcm_authentication_tag should raise JSON::JWE::DecryptionFailed when enc=A128CBC-HS256 behaves like decryptable should == "Hello World" behaves like verify_cbc_authentication_tag should raise JSON::JWE::DecryptionFailed when enc=A256CBC-HS512 behaves like decryptable should == "Hello World" behaves like verify_cbc_authentication_tag should raise JSON::JWE::DecryptionFailed when alg=dir when enc=A128GCM behaves like decryptable should == "Hello World" behaves like verify_gcm_authentication_tag should raise JSON::JWE::DecryptionFailed when enc=A256GCM behaves like decryptable should == "Hello World" behaves like verify_gcm_authentication_tag should raise JSON::JWE::DecryptionFailed when enc=A128CBC-HS256 behaves like decryptable should == "Hello World" behaves like verify_cbc_authentication_tag should raise JSON::JWE::DecryptionFailed when enc=A256CBC-HS512 behaves like decryptable should == "Hello World" behaves like verify_cbc_authentication_tag should raise JSON::JWE::DecryptionFailed when alg=A128KW TODO (PENDING: Not yet implemented) when alg=A256KW TODO (PENDING: Not yet implemented) when unknonw/unsupported algorithm given when alg=unknown behaves like unexpected_algorithm_for_decryption should raise JSON::JWE::UnexpectedAlgorithm when enc=unknown behaves like unexpected_algorithm_for_decryption should raise JSON::JWE::UnexpectedAlgorithm when alg=ECDH-ES behaves like unsupported_algorithm_for_decryption should raise NotImplementedError when alg=ECDH-ES+A128KW behaves like unsupported_algorithm_for_decryption should raise NotImplementedError when alg=ECDH-ES+A256KW behaves like unsupported_algorithm_for_decryption should raise NotImplementedError JSON::JWK::JWKizable #to_jwk OpenSSL::PKey::RSA public_key behaves like jwkizable_as_public should be an instance of JSON::JWK should include "kty", "n", and "e" should not include "d", "p", and "q" private_key behaves like jwkizable_as_private should be an instance of JSON::JWK should include "kty", "n", and "e" should include "d", "p", and "q" OpenSSL::PKey::EC public_key behaves like jwkizable_as_public should be an instance of JSON::JWK should include "kty", "crv", "x", and "y" should not include "d" private_key behaves like jwkizable_as_private should be an instance of JSON::JWK should include "kty", "crv", "x", and "y" should include "d" JSON::JWK::Set #content_type should == "application/jwk-set+json" when single JWK given should == [{"e"=>"AQAB", "kid"=>"nuBTimkcSt_AuEsD8Yv3l8CoGV31bu_3gsRDGN1iVKA", "kty"=>:RSA, "n"=>"x9vNhcvSrxjse...cVAZuhTTNaDLtLIJ6G0yNJvfEieJUhA8wGBoPhD3LMQwQMxTMerpjZhP_qjm6GgeWpKf-iVil86_PSy_z0Vw06_rD0sfXPtlQ"}] when multiple JWKs given should == [{"e"=>"AQAB", "kid"=>"nuBTimkcSt_AuEsD8Yv3l8CoGV31bu_3gsRDGN1iVKA", "kty"=>:RSA, "n"=>"x9vNhcvSrxjse...cVAZuhTTNaDLtLIJ6G0yNJvfEieJUhA8wGBoPhD3LMQwQMxTMerpjZhP_qjm6GgeWpKf-iVil86_PSy_z0Vw06_rD0sfXPtlQ"}] when an Array of JWKs given should == [{"e"=>"AQAB", "kid"=>"nuBTimkcSt_AuEsD8Yv3l8CoGV31bu_3gsRDGN1iVKA", "kty"=>:RSA, "n"=>"x9vNhcvSrxjse...cVAZuhTTNaDLtLIJ6G0yNJvfEieJUhA8wGBoPhD3LMQwQMxTMerpjZhP_qjm6GgeWpKf-iVil86_PSy_z0Vw06_rD0sfXPtlQ"}] when JSON::JWK given should keep JSON::JWK when pure Hash given should convert into JSON::JWK when pure Hash with :keys key given should convert into JSON::JWK #as_json should become proper JWK set format #to_json should not raise Exception JSON::JWK #initialize when no imput should be blank with OpenSSL::PKey::RSA behaves like jwk_with_kid should be an instance of JSON::JWK kid should == "nuBTimkcSt_AuEsD8Yv3l8CoGV31bu_3gsRDGN1iVKA" with OpenSSL::PKey::EC behaves like jwk_with_kid should be an instance of JSON::JWK kid should == "-egRpLjyZCqxBh4OOfd8JSvXwayHmNFAUNkbi8exfhc" with String behaves like jwk_with_kid should be an instance of JSON::JWK kid should == "XZPWsTEZFIerowAF9GHzBtq5CkAOcVvIBnkMu0IIQH0" with JSON::JWK behaves like jwk_with_kid should be an instance of JSON::JWK kid should == "XZPWsTEZFIerowAF9GHzBtq5CkAOcVvIBnkMu0IIQH0" with Hash behaves like jwk_with_kid should be an instance of JSON::JWK kid should == "XZPWsTEZFIerowAF9GHzBtq5CkAOcVvIBnkMu0IIQH0" with nothing behaves like jwk_without_kid should be an instance of JSON::JWK kid should be blank #content_type should == "application/jwk+json" when RSA public key given should include :kty, :e, and :n kty should == :RSA e should == "AQAB" n should == "x9vNhcvSrxjsegZAAo4OEuoZOV_oxINEeWneJYczS80_bQ1J6lSSJ81qecxXAzCLPlvsFoP4eeUNXSt_G7hP7SAM479N-kY_Mzbi...hLcVAZuhTTNaDLtLIJ6G0yNJvfEieJUhA8wGBoPhD3LMQwQMxTMerpjZhP_qjm6GgeWpKf-iVil86_PSy_z0Vw06_rD0sfXPtlQ" when kid/use options given should include :kid and :use kid should == "12345" use should == :sig #thumbprint using default hash function should == "nuBTimkcSt_AuEsD8Yv3l8CoGV31bu_3gsRDGN1iVKA" using SHA512 hash function should == "6v7pXTnQLMiQgvJlPJUdhAUSuGLzgF8C1r3ABAMFet6bc53ea-Pq4ZGbGu3RoAFsNRT1-RhTzDqtqXuLU6NOtw" #to_key should be an instance of OpenSSL::PKey::RSA when EC public key given EC256 should include :kty, :crv, :x, and :y kty should == :EC x should == "saPyrO4Lh9kh2FxrF9y1QVmZznWnRRJwpr12UHqzrVY" y should == "MMz4W9zzqlrJhqr-JyrpvlnaIIyZQE6DfrgPkxMAw1M" EC384 should include :kty, :crv, :x, and :y kty should == :EC x should == "plzApyFnK7qzhg5XnIZbFj2hZoH2Vdl4-RFm7DnsNMG9tyqrpfq2RyjfKABbcFRt" y should == "ixBzffhk3fcbmeipGLkvQBNCzeNm6QL3hOUTH6IFBzOL0Y7HsGTopNTTspLjlivb" EC512 should include :kty, :crv, :x, and :y kty should == :EC x should == "AcMCD-a0a6rnE9TvC0mOqF_DGXRg5Y3iTb4eHNwTm2kD6iujx9M_f8d_FGHr0OhpqzEn4rYPYZouGsbIPEgL0q__" y should == "AULYEd8l-bV_BI289aezhSLZ1RDF2ltgDPEy9Y7YtqYa4cJcpiyzVDMpXWwBp6cjg6TXINkoVrVXZhN404ihu4I2" unknown curve should raise JSON::JWK::UnknownAlgorithm with "Unknown EC Curve" #thumbprint using default hash function should == "-egRpLjyZCqxBh4OOfd8JSvXwayHmNFAUNkbi8exfhc" using SHA512 hash function should == "B_yXDZJ9doudaVCj5q5vqxshvVtW2IFnz_ypvRt5O60gemkDAhO78L6YMyTWH0ZRm15cO2_laTSaNO9yZQFsvQ" #to_key should be an instance of OpenSSL::PKey::EC when shared secret given kty should == :oct x should == "secret" #thumbprint using default hash function should == "XZPWsTEZFIerowAF9GHzBtq5CkAOcVvIBnkMu0IIQH0" using SHA512 hash function should == "rK7EtcEe9Xr0kryR9lNnyOTRe7Vb_BglbTBtbcVG2LzvL26_PFaMCwOtiUiXWfCK-wV8vcxjmvbcvV4ZxDE0FQ" #to_key should be an instance of String unknown key type should raise JSON::JWK::UnknownAlgorithm with "Unknown Key Type" JSON::JWS before sign behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:none, :typ=>:JWT} signature should be nil #content_type should == "application/jose" decode blank payload not allowed should raise format error blank payload allowed should not raise an error #sign! HS256 when String key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:HS256, :typ=>:JWT} behaves like generate_expected_signature should == "DyuTgO2Ggb5nrhkkhI-RjVYIBe3o8oL4ijkAn94YPxQ" with blank payload should == "iRFMM3GknVfzRTxlVQT87jfIw32Ik3lUYNGePPk5wnM" when JSON::JWK key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:HS256, :typ=>:JWT} behaves like generate_expected_signature should == "DyuTgO2Ggb5nrhkkhI-RjVYIBe3o8oL4ijkAn94YPxQ" with blank payload should == "iRFMM3GknVfzRTxlVQT87jfIw32Ik3lUYNGePPk5wnM" HS384 when String key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:HS384, :typ=>:JWT} behaves like generate_expected_signature should == "a5-7rr61TG8Snv9xxJ7l064ky-SCq1Mswe9t8HEorvoc_nnfIeUy9WQCLMIli34R" with blank payload should == "rxyzr3I2RWRBgQaewQt3yjdp3BqkrFh-iHcet318OYHWhXvyzAE0npf0l0xi5DOV" when JSON::JWK key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:HS384, :typ=>:JWT} behaves like generate_expected_signature should == "a5-7rr61TG8Snv9xxJ7l064ky-SCq1Mswe9t8HEorvoc_nnfIeUy9WQCLMIli34R" with blank payload should == "rxyzr3I2RWRBgQaewQt3yjdp3BqkrFh-iHcet318OYHWhXvyzAE0npf0l0xi5DOV" HS512 when String key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:HS512, :typ=>:JWT} behaves like generate_expected_signature should == "ce-GlHDaNwaHfmAFRGp3QPPKvrpruTug2hC1bf6yNlbuvkMwJw2jFZgq_4wmIPetRdiBy7XFq7rrtmw1Im7tmQ" with blank payload should == "VDHOrPYrwycjaKbwccObXi6dmw4fVFqiFsNFQjqYHQAkxJGxqhfVLc1_WfKMa6C7vGSGroabaVdK7nn08XPdSQ" when JSON::JWK key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:HS512, :typ=>:JWT} behaves like generate_expected_signature should == "ce-GlHDaNwaHfmAFRGp3QPPKvrpruTug2hC1bf6yNlbuvkMwJw2jFZgq_4wmIPetRdiBy7XFq7rrtmw1Im7tmQ" with blank payload should == "VDHOrPYrwycjaKbwccObXi6dmw4fVFqiFsNFQjqYHQAkxJGxqhfVLc1_WfKMa6C7vGSGroabaVdK7nn08XPdSQ" RS256 when OpenSSL::PKey::RSA key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:RS256, :typ=>:JWT} behaves like generate_expected_signature should == "E5VELqAdla2Bx1axc9KFxO0EiCr0Mw6HPYX070qGQ8zA_XmyxGPUZLyyWU_6Cn399W-oYBWO2ynLlr8pqqjP3jXevyCeYeGRVN0H...PbHLVGUopIoxoqe4XjoBpzE5UvhrVl5LYbdjbyJhu5ZIA8GLsgwtUFh3dfdIechORoR3k5NSFSv8157bAEa8t4iwgWD2MSNSQnw" with blank payload should == "WthQjouPVbErM7McwSY4slJjHaWqmFg1qKdmTDvttkiyAEcTjVViJkNHH9Mp573h13cXtLob1xh3UJYh5_-hSA4Y24zdyck3jp3f...3kHMns43GtT5bm-aJoMLct0nO1GBapQAiKUknTsw24IfOkX4vJNQzIWVSzx3zOxXjcVHlH92af6NknIlPCfRparLC9YEK2NkJYg" when JSON::JWK key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:RS256, :typ=>:JWT} behaves like generate_expected_signature should == "E5VELqAdla2Bx1axc9KFxO0EiCr0Mw6HPYX070qGQ8zA_XmyxGPUZLyyWU_6Cn399W-oYBWO2ynLlr8pqqjP3jXevyCeYeGRVN0H...PbHLVGUopIoxoqe4XjoBpzE5UvhrVl5LYbdjbyJhu5ZIA8GLsgwtUFh3dfdIechORoR3k5NSFSv8157bAEa8t4iwgWD2MSNSQnw" with blank payload should == "WthQjouPVbErM7McwSY4slJjHaWqmFg1qKdmTDvttkiyAEcTjVViJkNHH9Mp573h13cXtLob1xh3UJYh5_-hSA4Y24zdyck3jp3f...3kHMns43GtT5bm-aJoMLct0nO1GBapQAiKUknTsw24IfOkX4vJNQzIWVSzx3zOxXjcVHlH92af6NknIlPCfRparLC9YEK2NkJYg" RS384 when OpenSSL::PKey::RSA key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:RS384, :typ=>:JWT} behaves like generate_expected_signature should == "lT5JbytGKgG9QrwkJuxgw7UjmN9tjkEQW9pVGR2XnKEdC0_wLNIzAmT-jTwyMDGBLUkWO7opDOP6Xy6_DOTg58k9PwVkyQzrLnmx..._LUgy80udJvbi8MAYJVUf0QYtQDrX2wnT_-eiiWjD5XafLuXEQVDRh-v2MKAwdvtXMq5cZ08Zjl2SyHxJ3OqhEeWPvYGltxZh_A" with blank payload should == "Jy6XNLNAyujRHYoCOtFqu7z0imHZMiwkwBr73ok_DDSDxQSA9ryt_q_tX0u8knpAIRcTJuNA0-s5DkGbpIj9coKgZ5JBvE_n9ijv...LzONWr_QpCN-UFgmJHO7yBwaP-RWnLDW3hYlb4IybRIvMQQicjkjNaNwLTmwo31orVxO53GcSjyhU2y_R843nQcNjTT_lD1QRvg" when JSON::JWK key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:RS384, :typ=>:JWT} behaves like generate_expected_signature should == "lT5JbytGKgG9QrwkJuxgw7UjmN9tjkEQW9pVGR2XnKEdC0_wLNIzAmT-jTwyMDGBLUkWO7opDOP6Xy6_DOTg58k9PwVkyQzrLnmx..._LUgy80udJvbi8MAYJVUf0QYtQDrX2wnT_-eiiWjD5XafLuXEQVDRh-v2MKAwdvtXMq5cZ08Zjl2SyHxJ3OqhEeWPvYGltxZh_A" with blank payload should == "Jy6XNLNAyujRHYoCOtFqu7z0imHZMiwkwBr73ok_DDSDxQSA9ryt_q_tX0u8knpAIRcTJuNA0-s5DkGbpIj9coKgZ5JBvE_n9ijv...LzONWr_QpCN-UFgmJHO7yBwaP-RWnLDW3hYlb4IybRIvMQQicjkjNaNwLTmwo31orVxO53GcSjyhU2y_R843nQcNjTT_lD1QRvg" RS512 when OpenSSL::PKey::RSA key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:RS512, :typ=>:JWT} behaves like generate_expected_signature should == "EHeGM2Mo3ghhUfSB99AlREehrbC6OPE-nYL_rwf88ysTnJ8L1QQ0UuCrXq4SpRutGLK_bYTK3ZALvFRPoOgK_g0QWmqv6qjQRU_Q...tU0cKSalUp4geaBDH7QRcexrolIctdQFbNKTXQxoigxD3NLNkKGH7f6A8KZdcOm8AnEjullcZs8_OWGnW43p1qrxoBRSivb9pqQ" with blank payload should == "ws2HZ6wvh8GMrFKiIHXDogyx8HFpa4wvrLxfZaMfCoMPf0SZ4V3tiEZRWfrxyvwpsdBj2Mgm5lt3IYAHhlI2hqWvuikDq6tuVilo...LK-UkDQVclFmEM3JXrPG7YSRodtKlwJ-ESDx6CaJXXDAgitSF32dslcIkmOXRJqjNmF15i_aVg0ExiU92WTpCrdwzWTt4Aphqlw" when JSON::JWK key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:RS512, :typ=>:JWT} behaves like generate_expected_signature should == "EHeGM2Mo3ghhUfSB99AlREehrbC6OPE-nYL_rwf88ysTnJ8L1QQ0UuCrXq4SpRutGLK_bYTK3ZALvFRPoOgK_g0QWmqv6qjQRU_Q...tU0cKSalUp4geaBDH7QRcexrolIctdQFbNKTXQxoigxD3NLNkKGH7f6A8KZdcOm8AnEjullcZs8_OWGnW43p1qrxoBRSivb9pqQ" with blank payload should == "ws2HZ6wvh8GMrFKiIHXDogyx8HFpa4wvrLxfZaMfCoMPf0SZ4V3tiEZRWfrxyvwpsdBj2Mgm5lt3IYAHhlI2hqWvuikDq6tuVilo...LK-UkDQVclFmEM3JXrPG7YSRodtKlwJ-ESDx6CaJXXDAgitSF32dslcIkmOXRJqjNmF15i_aVg0ExiU92WTpCrdwzWTt4Aphqlw" ES256 when OpenSSL::PKey::EC key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:ES256, :typ=>:JWT} behaves like self_verifiable should be self-verifiable when JSON::JWK key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:ES256, :typ=>:JWT} behaves like self_verifiable should be self-verifiable ES384 when OpenSSL::PKey::EC key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:ES384, :typ=>:JWT} behaves like self_verifiable should be self-verifiable when JSON::JWK key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:ES384, :typ=>:JWT} behaves like self_verifiable should be self-verifiable ES512 when OpenSSL::PKey::EC key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:ES512, :typ=>:JWT} behaves like self_verifiable should be self-verifiable when JSON::JWK key given behaves like jwt_with_alg should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} header should == {:alg=>:ES512, :typ=>:JWT} behaves like self_verifiable should be self-verifiable when JSON::JWK::Set key given when jwk is found by given kid should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} otherwise should raise JSON::JWK::Set::KidNotFound unknown algorithm should raise JSON::JWS::UnexpectedAlgorithm #verify! HS256 when String key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully when JSON::JWK key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully HS384 when String key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully when JSON::JWK key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully HS512 when String key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully when JSON::JWK key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully RS256 when OpenSSL::PKey::RSA key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully when JSON::JWK key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully RS384 when OpenSSL::PKey::RSA key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully when JSON::JWK key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully RS512 when OpenSSL::PKey::RSA key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully when JSON::JWK key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully ES256 when OpenSSL::PKey::EC key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully when JSON::JWK key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully ES384 when OpenSSL::PKey::EC key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully when JSON::JWK key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully ES512 when OpenSSL::PKey::EC key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully when JSON::JWK key given behaves like success_signature_verification should be a kind of JSON::JWT header should be parsed successfully claims should be parsed successfully with blank payload should be a kind of JSON::JWT header should be parsed successfully claims true should be parsed successfully when JSON::JWK::Set key given when jwk is found by given kid should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} otherwise should raise JSON::JWK::Set::KidNotFound unknown algorithm should raise JSON::JWS::UnexpectedAlgorithm #to_json as default should JSONize payload with blank payload jws_blank: "" should JSONize payload when syntax option given when general should return General JWS JSON Serialization with blank payload should return General JWS JSON Serialization when not signed yet should not fail with blank payload should not fail when flattened should return Flattened JWS JSON Serialization with blank payload should return Flattened JWS JSON Serialization when not signed yet should not fail with blank payload should not fail JSON::JWT when not signed nor encrypted should == "eyJ0eXAiOiJKV1QiLCJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLCJleHAiOjEzMDA4MTkzODAsImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ." #content_type should == "application/jwt" #sign HS256 should be a kind of JSON::JWS HS384 should be a kind of JSON::JWS HS512 should be a kind of JSON::JWS RS256 should be a kind of JSON::JWS RS384 should be a kind of JSON::JWS RS512 should be a kind of JSON::JWS when no algirithm specified when key is String alg should == :HS256 when key is RSA key alg should == :RS256 when key is EC key when prime256v1 alg should == :ES256 when secp384r1 alg should == :ES384 when secp521r1 alg should == :ES512 when key is JWK with kty=okt alg should == :HS256 when key is JWK with kty=RSA alg should == :RS256 when key is JWK with kty=EC when prime256v1 alg should == :ES256 when secp384r1 alg should == :ES384 when secp521r1 alg should == :ES512 when non-JWK key is given should not set kid header automatically when JWK is given should set kid header automatically object copy behaviour when original JWT is modified copied JWS should be affected as shallow copy, but not as a simple reference when copied JWS is modified original JWT should be affected as shallow copy, but not as a simple reference #encrypt should encryptable without signing should encryptable after signed should accept optional algorithm should accept optional algorithm and encryption method when non-JWK key is given should not set kid header automatically when JWK is given should set kid header automatically .decode when not signed nor encrypted no signature given should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} when signed when no secret/key given should do verification when secret/key given should do verification when alg header malformed from alg=HS256 to alg=none should raise JSON::JWT::VerificationFailed from alg=RS256 to alg=none should raise JSON::JWT::UnexpectedAlgorithm to alg=HS256 should raise JSON::JWS::UnexpectedAlgorithm from alg=PS512 to alg=PS256 when verification algorithm is specified should raise JSON::JWS::UnexpectedAlgorithm with "Unexpected alg header" otherwise should not raise Exception to alg=RS516 when verification algorithm is specified should raise JSON::JWS::UnexpectedAlgorithm with "Unexpected alg header" otherwise should not raise Exception when :skip_verification given as secret/key should skip verification when JSON Serialization given when general behaves like json_serialization_parser when proper secret given should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} when verification skipped should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} when wrong secret given should raise JSON::JWT::VerificationFailed when flattened behaves like json_serialization_parser when proper secret given should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} when verification skipped should == {"exp"=>1300819380, "http://example.com/is_root"=>true, "iss"=>"joe"} when wrong secret given should raise JSON::JWT::VerificationFailed when encrypted should decryptable when :skip_decryption given as secret/key should skip verification when alg & enc is specified when expected should not raise Exception when alg is unexpected should raise JSON::JWE::UnexpectedAlgorithm with "Unexpected alg header" when enc is unexpected should raise JSON::JWE::UnexpectedAlgorithm with "Unexpected enc header" when JSON parse failed should raise JSON::JWT::InvalidFormat when unexpected format when too few dots should raise JSON::JWT::InvalidFormat when too many dots should raise JSON::JWT::InvalidFormat .pretty_generate size should == 2 first should == "{\n \"typ\": \"JWT\",\n \"alg\": \"HS256\"\n}" last should == "{\n \"iss\": \"joe\",\n \"exp\": 1300819380,\n \"http://example.com/is_root\": true\n}" Pending: (Failures listed here are expected and do not affect your suite's status) 1) interop with Nimbus JOSE Nimbus JOSE unavailable # No reason given # ./spec/interop/with_nimbus_jose_spec.rb:96 2) JSON::JWE encrypt! when plaintext given when alg=dir TODO # Not yet implemented # ./spec/json/jwe_spec.rb:35 3) JSON::JWE encrypt! when plaintext given when alg=A128KW TODO # Not yet implemented # ./spec/json/jwe_spec.rb:39 4) JSON::JWE encrypt! when plaintext given when alg=A256KW TODO # Not yet implemented # ./spec/json/jwe_spec.rb:43 5) JSON::JWE decrypt! when alg=A128KW TODO # Not yet implemented # ./spec/json/jwe_spec.rb:232 6) JSON::JWE decrypt! when alg=A256KW TODO # Not yet implemented # ./spec/json/jwe_spec.rb:236 Finished in 1.57 seconds (files took 1.29 seconds to load) 360 examples, 0 failures, 6 pending ┌──────────────────────────────────────────────────────────────────────────────┐ │ dh_ruby --install finished │ └──────────────────────────────────────────────────────────────────────────────┘ dh_installdocs -i -O--buildsystem=ruby dh_ruby_fixdocs -i -O--buildsystem=ruby dh_installchangelogs -i -O--buildsystem=ruby dh_installinit -i -O--buildsystem=ruby dh_installsystemduser -i -O--buildsystem=ruby dh_perl -i -O--buildsystem=ruby dh_link -i -O--buildsystem=ruby dh_strip_nondeterminism -i -O--buildsystem=ruby dh_compress -X.rb -i -O--buildsystem=ruby dh_fixperms -i -O--buildsystem=ruby dh_missing -i -O--buildsystem=ruby dh_installdeb -i -O--buildsystem=ruby dh_gencontrol -i -O--buildsystem=ruby dpkg-gencontrol: warning: Depends field of package ruby-json-jwt: substitution variable ${shlibs:Depends} used, but is not defined dpkg-gencontrol: warning: package ruby-json-jwt: substitution variable ${ruby:Depends} unused, but is defined dh_md5sums -i -O--buildsystem=ruby dh_builddeb -i -O--buildsystem=ruby dpkg-deb: building package 'ruby-json-jwt' in '../ruby-json-jwt_1.11.0-1_all.deb'. dpkg-genbuildinfo --build=all dpkg-genchanges --build=all >../ruby-json-jwt_1.11.0-1_all.changes dpkg-genchanges: info: binary-only arch-indep upload (source code and arch-specific packages not included) dpkg-source --after-build . dpkg-buildpackage: info: binary-only upload (no source included) I: running special hook: sync-out /build/ruby-json-jwt-qh8AF9 /tmp/ruby-json-jwt-1.11.0-1sprmtdps I: cleaning package lists and apt cache... I: creating tarball... I: done I: removing tempdir /tmp/mmdebstrap.t_CkrvsPxx... I: success in 365.2247 seconds md5: ruby-json-jwt_1.11.0-1_all.deb: OK sha1: ruby-json-jwt_1.11.0-1_all.deb: OK sha256: ruby-json-jwt_1.11.0-1_all.deb: OK Checksums: OK