Source: libdigest-bcrypt-perl, libdancer2-plugin-passphrase-perl Control: found -1 libdigest-bcrypt-perl/1.212-1 Control: found -1 libdancer2-plugin-passphrase-perl/3.3.4-1 Severity: serious Tags: sid bookworm X-Debbugs-CC: debian...@lists.debian.org User: debian...@lists.debian.org Usertags: breaks needs-update
Dear maintainer(s),With a recent upload of libdigest-bcrypt-perl the autopkgtest of libdancer2-plugin-passphrase-perl fails in testing when that autopkgtest is run with the binary packages of libdigest-bcrypt-perl from unstable. It passes when run with only packages from testing. In tabular form:
pass fail libdigest-bcrypt-perl from testing 1.212-1 libdancer2-plugin-passphrase-perl from testing 3.3.4-1 all others from testing from testing I copied some of the output at the bottom of this report.Currently this regression is blocking the migration of libdigest-bcrypt-perl to testing [1]. Due to the nature of this issue, I filed this bug report against both packages. Can you please investigate the situation and reassign the bug to the right package?
More information about this bug and the reason for filing it can be found on https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation Paul [1] https://qa.debian.org/excuses.php?package=libdigest-bcrypt-perl https://ci.debian.net/data/autopkgtest/testing/amd64/libd/libdancer2-plugin-passphrase-perl/18819128/log.gz t/001_basics.t ...................... 1..1 ok 1 - use Dancer2::Plugin::Passphrase; ok t/003_default_settings.t ............ 1..3 ok 1 - RFC compliant hash generated ok 2 - Match plaintext to hash ok 3 - Incorrect passwords should be rejected ok t/004_all_algorithm_matching.t ...... 1..26 ok 1 - With Salt - Match plaintext to hash => MD5 ok 2 - With Salt - Incorrect passwords should be rejected => MD5 ok 3 - With Salt - Match plaintext to hash => SHA-1 ok 4 - With Salt - Incorrect passwords should be rejected => SHA-1 ok 5 - With Salt - Match plaintext to hash => SHA-224 ok 6 - With Salt - Incorrect passwords should be rejected => SHA-224 ok 7 - With Salt - Match plaintext to hash => SHA-256 ok 8 - With Salt - Incorrect passwords should be rejected => SHA-256 ok 9 - With Salt - Match plaintext to hash => SHA-384 ok 10 - With Salt - Incorrect passwords should be rejected => SHA-384 ok 11 - With Salt - Match plaintext to hash => SHA-512 ok 12 - With Salt - Incorrect passwords should be rejected => SHA-512 ok 13 - With Salt - Match plaintext to hash => Bcrypt ok 14 - With Salt - Incorrect passwords should be rejected => Bcrypt ok 15 - No Salt - Match plaintext to hash => MD5 ok 16 - No Salt - Incorrect passwords should be rejected => MD5 ok 17 - No Salt - Match plaintext to hash => SHA-1 ok 18 - No Salt - Incorrect passwords should be rejected => SHA-1 ok 19 - No Salt - Match plaintext to hash => SHA-224 ok 20 - No Salt - Incorrect passwords should be rejected => SHA-224 ok 21 - No Salt - Match plaintext to hash => SHA-256 ok 22 - No Salt - Incorrect passwords should be rejected => SHA-256 ok 23 - No Salt - Match plaintext to hash => SHA-384 ok 24 - No Salt - Incorrect passwords should be rejected => SHA-384 ok 25 - No Salt - Match plaintext to hash => SHA-512 ok 26 - No Salt - Incorrect passwords should be rejected => SHA-512 ok t/005_random_passphrase.t ........... 1..3 ok 1 - Basic password generation ok 2 - Custom password length ok 3 - Custom chracter set ok t/006_return_object.t ............... 1..20ok 1 - An object of class 'Dancer2::Plugin::Passphrase::Hashed' isa 'Dancer2::Plugin::Passphrase::Hashed'
ok 2 - Contains RFC 2307 representation ok 3 - Contains correct scheme ok 4 - Contains correct cost ok 5 - Contains raw salt ok 6 - Contains hex hash ok 7 - Contains base64 hash ok 8 - Contains raw salt ok 9 - Contains hex salt ok 10 - Contains base64 salt ok 11 - Contains correct plaintext ok 12 - Extracted raw salt is the same as the defined raw salt ok 13 - Extracted base64 salt is the same as the defined base64 salt ok 14 - Extracted hex salt is the same as the defined hex salt ok 15 - Extracted raw hash is the same as the defined raw hash ok 16 - Extracted base64 hash is the same as the defined base64 hash ok 17 - Extracted hex hash is the same as the defined hex hash ok 18 - Contains a defined, but empty raw salt ok 19 - Contains a defined, but empty hex salt ok 20 - Contains a defined, but empty base64 salt ok t/007_no_salt.t ..................... 1..2 ok 1 - Match plaintext to it's pre-computed hash ok 2 - Match plaintext to it's generated hash ok t/008_unicode_matching.t ............ 1..8 ok 1 - UTF8 matches UTF8 for SHA-1 ok 2 - SHA-1 needs encoded text ok 3 - UTF8 matches UTF8 for SHA-256 ok 4 - SHA-256 needs encoded text ok 5 - UTF8 matches UTF8 for MD5 ok 6 - MD5 needs encoded text ok 7 - UTF8 matches UTF8 for Bcrypt not ok 8 - Bcrypt needs encoded text # Failed test 'Bcrypt needs encoded text' # at t/008_unicode_matching.t line 44.# 'Wide character in subroutine entry at /usr/lib/x86_64-linux-gnu/perl5/5.32/Crypt/Bcrypt.pm line 21.
# ' # doesn't match '(?^i:input must contain only octets)' # Looks like you failed 1 test of 8. Dubious, test returned 1 (wstat 256, 0x100) Failed 1/8 subtests t/009_exception_handling.t .......... 1..2 ok 1 - Dies on invalid RFC 2307 string ok 2 - Dies on almost valid RFC 2307 string ok t/011_alternative_bcrypt.t .......... 1..3 ok 1 - Matches $2a$ (ambiguous bcrypt) ok 2 - Matches $2x$ (broken bcrypt) ok 3 - Matches $2y$ (new standard bcrypt) ok t/013_hashes_generated_elsewhere.t .. 1..30 ok 1 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 2 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 3 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 4 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 5 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 6 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 7 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 8 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 9 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 10 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated ok 11 - Authen::Passphrase Bcrypt hashes can be validated ok 12 - Authen::Passphrase Bcrypt hashes can be validated ok 13 - Authen::Passphrase Bcrypt hashes can be validated ok 14 - Authen::Passphrase Bcrypt hashes can be validated ok 15 - Authen::Passphrase Bcrypt hashes can be validated ok 16 - Authen::Passphrase Bcrypt hashes can be validated ok 17 - Authen::Passphrase Bcrypt hashes can be validated ok 18 - Authen::Passphrase Bcrypt hashes can be validated ok 19 - Authen::Passphrase Bcrypt hashes can be validated ok 20 - Authen::Passphrase Bcrypt hashes can be validated ok 21 - Ruby Bcrypt hashes can be validated ok 22 - Ruby Bcrypt hashes can be validated ok 23 - Ruby Bcrypt hashes can be validated ok 24 - Ruby Bcrypt hashes can be validated ok 25 - Ruby Bcrypt hashes can be validated ok 26 - Ruby Bcrypt hashes can be validated ok 27 - Ruby Bcrypt hashes can be validated ok 28 - Ruby Bcrypt hashes can be validated ok 29 - Ruby Bcrypt hashes can be validated ok 30 - Ruby Bcrypt hashes can be validated ok Test Summary Report ------------------- t/008_unicode_matching.t (Wstat: 256 Tests: 8 Failed: 1) Failed test: 8 Non-zero exit status: 1Files=10, Tests=98, 4 wallclock secs ( 0.06 usr 0.00 sys + 3.94 cusr 0.33 csys = 4.33 CPU)
Result: FAIL autopkgtest [23:11:12]: test autodep8-perl-build-deps
OpenPGP_signature
Description: OpenPGP digital signature