Package: src:node-crypto-browserify Version: 3.12.0-7 Severity: serious Tags: ftbfs forky sid
Dear maintainer: During a rebuild of all packages in unstable, this package failed to build. Below you will find the last part of the build log (probably the most relevant part, but not necessarily). If required, the full build log is available here: https://people.debian.org/~sanvila/build-logs/202512/ About the archive rebuild: The build was made on virtual machines from AWS, using sbuild and a reduced chroot with only build-essential packages. If you cannot reproduce the bug please contact me privately, as I am willing to provide ssh access to a virtual machine where the bug is fully reproducible. If this is really a bug in one of the build-depends, please use reassign and add an affects on src:node-crypto-browserify, so that this is still visible in the BTS web page for this package. Thanks. -------------------------------------------------------------------------------- [...] debian/rules clean dh clean dh_auto_clean --buildsystem=nodejs rm -rf ./node_modules/.cache ./.nyc_output rm ./node_modules/.cache rm ./node_modules/.cache dh_clean debian/rules binary dh binary dh_update_autotools_config dh_autoreconf dh_auto_configure --buildsystem=nodejs dh_auto_build --buildsystem=nodejs No build command found, searching known files dh_auto_test --buildsystem=nodejs mkdir -p node_modules ln -s ../. node_modules/crypto-browserify /bin/sh -ex debian/tests/pkg-js/test + node test/index.js (node:52) [DEP0005] DeprecationWarning: Buffer() is deprecated due to security and usability issues. Please use the Buffer.alloc(), Buffer.allocUnsafe(), or Buffer.from() methods instead. (Use `node --trace-deprecation ...` to show where the warning was created) TAP version 13 # createHash in crypto-browserify test sha1 against test vectors # createHash in crypto-browserify test sha224 against test vectors # createHash in crypto-browserify test sha256 against test vectors # createHash in crypto-browserify test sha384 against test vectors # createHash in crypto-browserify test sha512 against test vectors # createHash in crypto-browserify test md5 against test vectors # create-hash/browser test sha1 against test vectors # create-hash/browser test sha224 against test vectors # create-hash/browser test sha256 against test vectors # create-hash/browser test sha384 against test vectors # create-hash/browser test sha512 against test vectors # create-hash/browser test md5 against test vectors # createHmac in crypto-browserify hmac(sha1) # hmac(sha1) # createHmac in crypto-browserify hmac(sha224) # hmac(sha224) # createHmac in crypto-browserify hmac(sha256) # hmac(sha256) # createHmac in crypto-browserify hmac(sha384) # hmac(sha384) # createHmac in crypto-browserify hmac(sha512) # hmac(sha512) # createHmac in crypto-browserify hmac(md5) # hmac(md5) # create-hmac/browser hmac(sha1) # hmac(sha1) # create-hmac/browser hmac(sha224) # hmac(sha224) # create-hmac/browser hmac(sha256) # hmac(sha256) # create-hmac/browser hmac(sha384) # hmac(sha384) # create-hmac/browser hmac(sha512) # hmac(sha512) # create-hmac/browser hmac(md5) # hmac(md5) # pbkdf2 ok 1 should be strictly equal ok 2 should be strictly equal ok 3 should be strictly equal ok 4 should be strictly equal ok 5 should be strictly equal # createECDH: secp256k1 uncompressed ok 6 diff public keys ok 7 equal secrets # createECDH: secp256k1 compressed ok 8 diff public keys ok 9 equal secrets # createECDH: secp256k1 set stuff ok 10 same private key ok 11 same public keys, uncompressed ok 12 same public keys compressed ok 13 same public keys hybrid ok 14 equal secrets # createECDH: secp224r1 uncompressed ok 15 diff public keys ok 16 equal secrets # createECDH: secp224r1 compressed ok 17 diff public keys ok 18 equal secrets # createECDH: secp224r1 set stuff ok 19 same private key ok 20 same public keys, uncompressed ok 21 same public keys compressed ok 22 same public keys hybrid ok 23 equal secrets # createECDH: prime256v1 uncompressed ok 24 diff public keys ok 25 equal secrets # createECDH: prime256v1 compressed ok 26 diff public keys ok 27 equal secrets # createECDH: prime256v1 set stuff ok 28 same private key ok 29 same public keys, uncompressed ok 30 same public keys compressed ok 31 same public keys hybrid ok 32 equal secrets # createECDH: prime192v1 uncompressed ok 33 diff public keys ok 34 equal secrets # createECDH: prime192v1 compressed ok 35 diff public keys ok 36 equal secrets # createECDH: prime192v1 set stuff ok 37 same private key ok 38 same public keys, uncompressed ok 39 same public keys compressed ok 40 same public keys hybrid ok 41 equal secrets # publicEncrypt/privateDecrypt # can decrypt ok 42 decrypt it properly ok 43 decrypt it properly # can round trip ok 44 round trip it ok 45 round trip it # privateEncrypt/publicDecrypt # can round trip ok 46 round trip it ok 47 round trip it # get error message ok 48 should be truthy # randomBytes ok 49 should be strictly equal ok 50 should be truthy ok 51 null ok 52 should be strictly equal ok 53 should be truthy # randomBytes seem random [116.77199928749558,126.068,139.22800071250444] ok 54 should be truthy ok 55 should be truthy # get error message ok 56 should be truthy # pseudoRandomBytes ok 57 should be strictly equal ok 58 should be truthy ok 59 null ok 60 should be strictly equal ok 61 should be truthy # pseudoRandomBytes seem random [116.58413384801662,130.322,139.41586615198338] ok 62 should be truthy ok 63 should be truthy # rsa with sha256 # js sign and verify ok 64 validates # node sign and verify ok 65 validates # node sign and js verify ok 66 validates # js sign and node verify ok 67 validates # ec with sha1 # js sign and verify ok 68 validates # node sign and verify skipping unsupported scheme ecdsa-with-SHA1 # node sign and js verify skipping unsupported scheme ecdsa-with-SHA1 # js sign and node verify skipping unsupported scheme ecdsa-with-SHA1 # get error message ok 69 should be truthy # randomfill ok 70 should be strictly equal ok 71 should be truthy ok 72 null ok 73 should be strictly equal ok 74 should be truthy # seems random [116.44837673744507,133.44,139.55162326255493] ok 75 should be truthy ok 76 should be truthy # run: 1 # ciphers: des3 ok 77 should be strictly equal # run: 1 # ciphers: des-ede3-cbc ok 78 should be strictly equal # run: 1 # ciphers: des-ede3 ok 79 should be strictly equal # run: 1 # ciphers: des-ede-cbc ok 80 should be strictly equal # run: 1 # ciphers: des-ede ok 81 should be strictly equal # run: 1 # ciphers: aes-128-ecb ok 82 should be strictly equal # run: 1 # ciphers: aes-192-ecb ok 83 should be strictly equal # run: 1 # ciphers: aes-256-ecb ok 84 should be strictly equal # run: 1 # ciphers: aes-128-cbc ok 85 should be strictly equal # run: 1 # ciphers: aes-192-cbc ok 86 should be strictly equal # run: 1 # ciphers: aes-256-cbc ok 87 should be strictly equal # run: 1 # ciphers: aes128 ok 88 should be strictly equal # run: 1 # ciphers: aes192 ok 89 should be strictly equal # run: 1 # ciphers: aes256 ok 90 should be strictly equal # run: 1 # ciphers: aes-128-cfb ok 91 should be strictly equal # run: 1 # ciphers: aes-192-cfb ok 92 should be strictly equal # run: 1 # ciphers: aes-256-cfb ok 93 should be strictly equal # run: 1 # ciphers: aes-128-cfb8 ok 94 should be strictly equal # run: 1 # ciphers: aes-192-cfb8 ok 95 should be strictly equal # run: 1 # ciphers: aes-256-cfb8 ok 96 should be strictly equal # run: 1 # ciphers: aes-128-cfb1 ok 97 should be strictly equal # run: 1 # ciphers: aes-192-cfb1 ok 98 should be strictly equal # run: 1 # ciphers: aes-256-cfb1 ok 99 should be strictly equal # run: 1 # ciphers: aes-128-ofb ok 100 should be strictly equal # run: 1 # ciphers: aes-192-ofb ok 101 should be strictly equal # run: 1 # ciphers: aes-256-ofb ok 102 should be strictly equal # run: 1 # ciphers: aes-128-ctr ok 103 should be strictly equal # run: 1 # ciphers: aes-192-ctr ok 104 should be strictly equal # run: 1 # ciphers: aes-256-ctr ok 105 should be strictly equal # run: 1 # ciphers: aes-128-gcm ok 106 should be strictly equal # run: 1 # ciphers: aes-192-gcm ok 107 should be strictly equal # run: 1 # ciphers: aes-256-gcm ok 108 should be strictly equal # getCiphers ok 109 get ciphers returns an array # through crypto browserify works /<<PKGBUILDDIR>>/test/aes.js:41 var crypter = crypto.createCipher(cipher, password) ^ TypeError: crypto.createCipher is not a function at Test.<anonymous> (/<<PKGBUILDDIR>>/test/aes.js:41:24) at Test.bound [as _cb] (/usr/share/nodejs/tape/lib/test.js:95:17) at Test.run (/usr/share/nodejs/tape/lib/test.js:115:28) at Test.bound [as run] (/usr/share/nodejs/tape/lib/test.js:95:17) at Immediate.next (/usr/share/nodejs/tape/lib/results.js:157:7) at process.processImmediate (node:internal/timers:485:21) Node.js v22.21.1 dh_auto_test: error: /bin/sh -ex debian/tests/pkg-js/test returned exit code 1 make: *** [debian/rules:8: binary] Error 25 dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2 -------------------------------------------------------------------------------- -- Pkg-javascript-devel mailing list [email protected] https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-javascript-devel
