X-Loop: help-debbugs@HIDDEN Subject: bug#75419: python-celery build failed: spurious linebreaks in tests Resent-From: "Dr. Arne Babenhauserheide" <arne_bab@HIDDEN> Original-Sender: "Debbugs-submit" <debbugs-submit-bounces <at> debbugs.gnu.org> Resent-CC: bug-guix@HIDDEN Resent-Date: Tue, 07 Jan 2025 13:31:02 +0000 Resent-Message-ID: <handler.75419.B.173625661128904 <at> debbugs.gnu.org> Resent-Sender: help-debbugs@HIDDEN X-GNU-PR-Message: report 75419 X-GNU-PR-Package: guix X-GNU-PR-Keywords: To: 75419 <at> debbugs.gnu.org X-Debbugs-Original-To: bug-guix@HIDDEN Received: via spool by submit <at> debbugs.gnu.org id=B.173625661128904 (code B ref -1); Tue, 07 Jan 2025 13:31:02 +0000 Received: (at submit) by debbugs.gnu.org; 7 Jan 2025 13:30:11 +0000 Received: from localhost ([127.0.0.1]:42090 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from <debbugs-submit-bounces <at> debbugs.gnu.org>) id 1tV9er-0007V6-Il for submit <at> debbugs.gnu.org; Tue, 07 Jan 2025 08:30:11 -0500 Received: from lists.gnu.org ([2001:470:142::17]:37062) by debbugs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.84_2) (envelope-from <arne_bab@HIDDEN>) id 1tV9en-0007Tc-Na for submit <at> debbugs.gnu.org; Tue, 07 Jan 2025 08:30:07 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <arne_bab@HIDDEN>) id 1tV9ee-0000N0-4T for bug-guix@HIDDEN; Tue, 07 Jan 2025 08:29:58 -0500 Received: from mout.web.de ([212.227.15.3]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <arne_bab@HIDDEN>) id 1tV9ea-0002Jt-1s for bug-guix@HIDDEN; Tue, 07 Jan 2025 08:29:55 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=web.de; s=s29768273; t=1736256585; x=1736861385; i=arne_bab@HIDDEN; bh=6fSm4uwBusMGi879gkL0leYix0ORwHVy9NyAQYRKqnQ=; h=X-UI-Sender-Class:From:To:Subject:Date:Message-ID:MIME-Version: Content-Type:cc:content-transfer-encoding:content-type:date:from: message-id:mime-version:reply-to:subject:to; b=aPTZQS/Xr+pCkBHGp6xAeNXgOpxL4qagMxLSZpoBRup8Ra+gVA53LpBcFoKdMBqx EKncumQWQh0k+PCo93lEBT/Aos2e5lxCR/duZjeOMVZAMYUPZ5GXuL/la0hdoxCAK a44oMpR+6ZwhTqvcRubQjXsFrJFRv5MdN+9USH4z9X0R5ohThr6VzzCt5zsTzIECj 0RFBA5kkm/nmxI3GodysEdHH9s9WBpm0h5GDnxtMBWVLYryrwyJmjLL8HwNxBzrU2 pcXj2ZJPMC6SJVtMJBw+JoKSTpy5iYQuxhA4JB93TtX4YaGriYLXj3zcADXZ28CyZ gDOGyBDP6uz+0uGfoQ== X-UI-Sender-Class: 814a7b36-bfc1-4dae-8640-3722d8ec6cd6 Received: from fluss ([84.165.21.171]) by smtp.web.de (mrweb005 [213.165.67.108]) with ESMTPSA (Nemesis) id 1MpCqh-1toEvm2HhX-00ntFb; Tue, 07 Jan 2025 14:29:45 +0100 From: "Dr. Arne Babenhauserheide" <arne_bab@HIDDEN> User-Agent: mu4e 1.12.7; emacs 30.0.91 Date: Tue, 07 Jan 2025 14:29:42 +0100 Message-ID: <87wmf6bvll.fsf@HIDDEN> MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha256; protocol="application/pgp-signature" X-Provags-ID: V03:K1:K3glV+rOkalkS1ZljoGfRiBM+sZBwcDfe1fpHZMWAGjIvo/gYxP ZjDMYrCD7ZyBZIbPu/RncpH4VNYu9cxf9Qs6/8yKz/Dahb9o4wMvt0I0eBUu4KJYrn9Q5ux MePVBwM24sX7n1r39Um94H/TNNxl01KRr+LdJvsMkBXoecczNgtBc30nRrXRm91+grBI/pC 15cDmRHTyj1eUY0Z3g/iA== X-Spam-Flag: NO UI-OutboundReport: notjunk:1;M01:P0:Rc+BXNUlQYk=;0GevpoYnRRwG2heTXHQ7JL37WYI AbGcIU6qTPEv/bvwXLsRgJfS766FIERmL4LXdFRg+REU8IHmHdPfTcTm5Zze4ZfiOuZKlQXwI ytnEngF/StFQx2yUehV2IVVa6/ahChbUkC+Tj3wQYqsAYgCu34mN+7aWL7zdnjhSJZoZLGnhA F9H/x5Pwlc8lbUq7+uYRKyq6GZnsu0gXgb3Q7Y9oSYlWpM60bQw6RM2y8vc+EvdfxW5Mrn09T 6tH+dc4reGhl5hKIEXWqaYaxZsJSz2VGAukf9Rr86ofkmr4MZiJ9V6/pmNIaAJ3IMu1TvET8h AirgLdzEvKsHGMcPbw2xNx9igxBHYzYtWV6SXrk4L3TaIMY8Pel3AQkn5RIYxHiTyEMxJLYzB jNEloVdOOGFo+MiWohRORGjh7gHbPJ+bHD+g5g7qlTfhFcnRjS6R2XkTaAcynKWTPeLabDXnW urQOhtPZVhbahvqirZlCj/BIHvbEbPHMFLMTrvwmyDZUeESTnRBSgH6kQC17y2wjstUA1gC3s w3IbpQWv6XpvDmywjy6S3Tf3ayYf3rhTCCeceg0fBNimCOxvDxRlHs3Ozg3ROWN/53o1+9gCu BClseAmbWF6pEO0C7esKHjKuQ/6MerogBcBgeFgEME2Bxmm/2eXIXGr4hxVBtpYmJWZMxDpM7 sfwZvWDx8S58fBdYrv0g2c+SpCFZW8C1iREWVwK7hcAj8JMIgP0MH38Tll9+1QIFuvcZuhMND Ko9IG3Zvkt/5l7sDq0xmg4nLNOPRtRMFtEPWbDWE+vxVO+F8Nx2CrNi9qCq7QJ5Pdozl4TABb cY0+A85OneAEd0ALnoceP6MK3hbaqYsc91bSwUpp3RsfZ/vgRZlIzW78984tkxApdD6p5rXPm iFGohdW3VTGlhn9Suyx8KBiq8Wtf4SxNkGVNxEBjHsMNslqbj8pfJsIMhZl4GUndkJ9s4Hyjz gzj8/dbcqV/aJejrdL40Cu1fKC7L1uckJ9Drvx+gn1jJWXHxXe7oTF3Eem6A0102rjFvy7f8y ORLa8zRKgZyZsUKzprwMNkT95N5SbLGbT5ox3qhgHT4K7+9p7sGQF+DbbQeh+HXudnBG42WCc g+01sZFC0= Received-SPF: pass client-ip=212.227.15.3; envelope-from=arne_bab@HIDDEN; helo=mout.web.de X-Spam_score_int: -27 X-Spam_score: -2.8 X-Spam_bar: -- X-Spam_report: (-2.8 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-Spam-Score: 0.0 (/) X-BeenThere: debbugs-submit <at> debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: <debbugs-submit.debbugs.gnu.org> List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>, <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=unsubscribe> List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/> List-Post: <mailto:debbugs-submit <at> debbugs.gnu.org> List-Help: <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=help> List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>, <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=subscribe> Errors-To: debbugs-submit-bounces <at> debbugs.gnu.org Sender: "Debbugs-submit" <debbugs-submit-bounces <at> debbugs.gnu.org> X-Spam-Score: -1.0 (-) --=-=-= Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable The build of python-celery fails because test TestBackendEcdsaCompatibility.test_public_key_to_pem[ECDSAECKey-Cryptograph= yECKey] fails. The reason seems to be that linebreaks are inserted at different places than expected. End of the logfile /var/log/guix/drvs/fx/d67zlmgm6mh90pdc4db8j22l47r15l-python-jose-3.3.0.drv.= gz: tests/test_utils.py::TestUtils::test_long_to_base64 PASSED [1= 00%] =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D FAILURES =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D _ TestBackendEcdsaCompatibility.test_public_key_to_pem[ECDSAECKey-Cryptogra= phyECKey] _ self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj= ect at 0x7ffff54111e0> BackendFrom =3D <class 'jose.backends.cryptography_backend.CryptographyECKe= y'> BackendTo =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'> @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey]) @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey]) def test_public_key_to_pem(self, BackendFrom, BackendTo): key =3D BackendFrom(private_key, ALGORITHMS.ES256) key2 =3D BackendTo(private_key, ALGORITHMS.ES256) =20=20=20=20 > assert key.public_key().to_pem().strip() =3D=3D key2.public_key().t= o_pem().strip() E AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj= 0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+= DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D= b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ= 7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn= Tm88Q=3D=3D\n-----END PUBLIC KEY-----' E=20=20=20=20=20=20=20=20=20 E At index 91 diff: b'\n' !=3D b't' E=20=20=20=20=20=20=20=20=20 E Full diff: E (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD= QgAE7gb4edKJ7' E - b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX= ME+DRh6G/yVOK' E ? -- E + b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX= ME+DRh6G/yVOK' E ? ++ E b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----') tests/algorithms/test_EC_compat.py:40: AssertionError _ TestBackendEcdsaCompatibility.test_public_key_to_pem[CryptographyECKey-EC= DSAECKey] _ self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj= ect at 0x7ffff5411c00> BackendFrom =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'> BackendTo =3D <class 'jose.backends.cryptography_backend.CryptographyECKey'> @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey]) @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey]) def test_public_key_to_pem(self, BackendFrom, BackendTo): key =3D BackendFrom(private_key, ALGORITHMS.ES256) key2 =3D BackendTo(private_key, ALGORITHMS.ES256) =20=20=20=20 > assert key.public_key().to_pem().strip() =3D=3D key2.public_key().t= o_pem().strip() E AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj= 0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+= DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D= b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ= 7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn= Tm88Q=3D=3D\n-----END PUBLIC KEY-----' E=20=20=20=20=20=20=20=20=20 E At index 91 diff: b't' !=3D b'\n' E=20=20=20=20=20=20=20=20=20 E Full diff: E (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD= QgAE7gb4edKJ7' E - b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX= ME+DRh6G/yVOK' E ? -- E + b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX= ME+DRh6G/yVOK' E ? ++ E b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----') tests/algorithms/test_EC_compat.py:40: AssertionError _ TestBackendEcdsaCompatibility.test_private_key_to_pem[ECDSAECKey-Cryptogr= aphyECKey] _ self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj= ect at 0x7ffff5410e20> BackendFrom =3D <class 'jose.backends.cryptography_backend.CryptographyECKe= y'> BackendTo =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'> @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey]) @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey]) def test_private_key_to_pem(self, BackendFrom, BackendTo): key =3D BackendFrom(private_key, ALGORITHMS.ES256) key2 =3D BackendTo(private_key, ALGORITHMS.ES256) =20=20=20=20 > assert key.to_pem().strip() =3D=3D key2.to_pem().strip() E AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO= iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edK= J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOK= nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE = KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49A= wEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIOR= lPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' E=20=20=20=20=20=20=20=20=20 E At index 95 diff: b'\n' !=3D b'A' E=20=20=20=20=20=20=20=20=20 E Full diff: E (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR= mzYybKdMlGniS' E - b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ= TZ8qktqtBfRKb' E ? -- E + b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ= TZ8qktqtBfRKb' E ? ++ E - b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n= -----END EC PRIVAT' E ? -- E + b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n= -----END EC PRIVAT' E ? ++ E b'E KEY-----') tests/algorithms/test_EC_compat.py:48: AssertionError _ TestBackendEcdsaCompatibility.test_private_key_to_pem[CryptographyECKey-E= CDSAECKey] _ self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj= ect at 0x7ffff54137f0> BackendFrom =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'> BackendTo =3D <class 'jose.backends.cryptography_backend.CryptographyECKey'> @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey]) @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey]) def test_private_key_to_pem(self, BackendFrom, BackendTo): key =3D BackendFrom(private_key, ALGORITHMS.ES256) key2 =3D BackendTo(private_key, ALGORITHMS.ES256) =20=20=20=20 > assert key.to_pem().strip() =3D=3D key2.to_pem().strip() E AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO= iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edK= J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOK= nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE = KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\= nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWI= ORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' E=20=20=20=20=20=20=20=20=20 E At index 95 diff: b'A' !=3D b'\n' E=20=20=20=20=20=20=20=20=20 E Full diff: E (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR= mzYybKdMlGniS' E - b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ= TZ8qktqtBfRKb' E ? -- E + b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ= TZ8qktqtBfRKb' E ? ++ E - b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n= -----END EC PRIVAT' E ? -- E + b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n= -----END EC PRIVAT' E ? ++ E b'E KEY-----') tests/algorithms/test_EC_compat.py:48: AssertionError _ TestBackendEcdsaCompatibility.test_public_key_load_cycle[ECDSAECKey-Crypt= ographyECKey] _ self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj= ect at 0x7ffff5411b10> BackendFrom =3D <class 'jose.backends.cryptography_backend.CryptographyECKe= y'> BackendTo =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'> @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey]) @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey]) def test_public_key_load_cycle(self, BackendFrom, BackendTo): key =3D BackendFrom(private_key, ALGORITHMS.ES256) pubkey =3D key.public_key() =20=20=20=20 pub_pem_source =3D pubkey.to_pem().strip() =20=20=20=20 pub_target =3D BackendTo(pub_pem_source, ALGORITHMS.ES256) =20=20=20=20 > assert pub_pem_source =3D=3D pub_target.to_pem().strip() E AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj= 0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+= DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D= b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ= 7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn= Tm88Q=3D=3D\n-----END PUBLIC KEY-----' E=20=20=20=20=20=20=20=20=20 E At index 91 diff: b'\n' !=3D b't' E=20=20=20=20=20=20=20=20=20 E Full diff: E (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD= QgAE7gb4edKJ7' E - b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX= ME+DRh6G/yVOK' E ? -- E + b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX= ME+DRh6G/yVOK' E ? ++ E b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----') tests/algorithms/test_EC_compat.py:60: AssertionError _ TestBackendEcdsaCompatibility.test_public_key_load_cycle[CryptographyECKe= y-ECDSAECKey] _ self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj= ect at 0x7ffff5410c70> BackendFrom =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'> BackendTo =3D <class 'jose.backends.cryptography_backend.CryptographyECKey'> @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey]) @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey]) def test_public_key_load_cycle(self, BackendFrom, BackendTo): key =3D BackendFrom(private_key, ALGORITHMS.ES256) pubkey =3D key.public_key() =20=20=20=20 pub_pem_source =3D pubkey.to_pem().strip() =20=20=20=20 pub_target =3D BackendTo(pub_pem_source, ALGORITHMS.ES256) =20=20=20=20 > assert pub_pem_source =3D=3D pub_target.to_pem().strip() E AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj= 0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+= DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D= b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ= 7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn= Tm88Q=3D=3D\n-----END PUBLIC KEY-----' E=20=20=20=20=20=20=20=20=20 E At index 91 diff: b't' !=3D b'\n' E=20=20=20=20=20=20=20=20=20 E Full diff: E (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD= QgAE7gb4edKJ7' E - b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX= ME+DRh6G/yVOK' E ? -- E + b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX= ME+DRh6G/yVOK' E ? ++ E b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----') tests/algorithms/test_EC_compat.py:60: AssertionError _ TestBackendEcdsaCompatibility.test_private_key_load_cycle[ECDSAECKey-Cryp= tographyECKey] _ self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj= ect at 0x7ffff5411f00> BackendFrom =3D <class 'jose.backends.cryptography_backend.CryptographyECKe= y'> BackendTo =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'> @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey]) @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey]) def test_private_key_load_cycle(self, BackendFrom, BackendTo): key =3D BackendFrom(private_key, ALGORITHMS.ES256) =20=20=20=20 pem_source =3D key.to_pem().strip() =20=20=20=20 target =3D BackendTo(pem_source, ALGORITHMS.ES256) =20=20=20=20 > assert pem_source =3D=3D target.to_pem().strip() E AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO= iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edK= J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOK= nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE = KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49A= wEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIOR= lPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' E=20=20=20=20=20=20=20=20=20 E At index 95 diff: b'\n' !=3D b'A' E=20=20=20=20=20=20=20=20=20 E Full diff: E (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR= mzYybKdMlGniS' E - b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ= TZ8qktqtBfRKb' E ? -- E + b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ= TZ8qktqtBfRKb' E ? ++ E - b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n= -----END EC PRIVAT' E ? -- E + b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n= -----END EC PRIVAT' E ? ++ E b'E KEY-----') tests/algorithms/test_EC_compat.py:71: AssertionError _ TestBackendEcdsaCompatibility.test_private_key_load_cycle[CryptographyECK= ey-ECDSAECKey] _ self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj= ect at 0x7ffff5412d40> BackendFrom =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'> BackendTo =3D <class 'jose.backends.cryptography_backend.CryptographyECKey'> @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey]) @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey]) def test_private_key_load_cycle(self, BackendFrom, BackendTo): key =3D BackendFrom(private_key, ALGORITHMS.ES256) =20=20=20=20 pem_source =3D key.to_pem().strip() =20=20=20=20 target =3D BackendTo(pem_source, ALGORITHMS.ES256) =20=20=20=20 > assert pem_source =3D=3D target.to_pem().strip() E AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO= iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edK= J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOK= nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE = KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\= nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWI= ORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' E=20=20=20=20=20=20=20=20=20 E At index 95 diff: b'A' !=3D b'\n' E=20=20=20=20=20=20=20=20=20 E Full diff: E (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR= mzYybKdMlGniS' E - b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ= TZ8qktqtBfRKb' E ? -- E + b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ= TZ8qktqtBfRKb' E ? ++ E - b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n= -----END EC PRIVAT' E ? -- E + b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n= -----END EC PRIVAT' E ? ++ E b'E KEY-----') tests/algorithms/test_EC_compat.py:71: AssertionError =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D short test summary info =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t= est_public_key_to_pem[ECDSAECKey-CryptographyECKey] - AssertionError: asser= t b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edK= J7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOK= nTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-----= \nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKbo= a71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC = KEY-----' =20=20 At index 91 diff: b'\n' !=3D b't' =20=20 Full diff: (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4= edKJ7' - b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G= /yVOK' ? -- + b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G= /yVOK' ? ++ b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----') FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t= est_public_key_to_pem[CryptographyECKey-ECDSAECKey] - AssertionError: asser= t b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edK= J7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOK= nTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-----= \nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRK= boa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC = KEY-----' =20=20 At index 91 diff: b't' !=3D b'\n' =20=20 Full diff: (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4= edKJ7' - b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G= /yVOK' ? -- + b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G= /yVOK' ? ++ b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----') FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t= est_private_key_to_pem[ECDSAECKey-CryptographyECKey] - AssertionError: asse= rt b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlG= niSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRK= boa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END EC PR= IVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnB= lfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9Igo= mCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q= =3D=3D\n-----END EC PRIVATE KEY-----' =20=20 At index 95 diff: b'\n' !=3D b'A' =20=20 Full diff: (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM= lGniS' - b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKb' ? -- + b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKb' ? ++ - b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END= EC PRIVAT' ? -- + b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END= EC PRIVAT' ? ++ b'E KEY-----') FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t= est_private_key_to_pem[CryptographyECKey-ECDSAECKey] - AssertionError: asse= rt b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlG= niSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRK= boa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END EC PR= IVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnB= lfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9Igo= mCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q= =3D=3D\n-----END EC PRIVATE KEY-----' =20=20 At index 95 diff: b'A' !=3D b'\n' =20=20 Full diff: (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM= lGniS' - b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKb' ? -- + b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKb' ? ++ - b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END= EC PRIVAT' ? -- + b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END= EC PRIVAT' ? ++ b'E KEY-----') FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t= est_public_key_load_cycle[ECDSAECKey-CryptographyECKey] - AssertionError: a= ssert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb= 4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/= yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-= ----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBf= RKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUB= LIC KEY-----' =20=20 At index 91 diff: b'\n' !=3D b't' =20=20 Full diff: (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4= edKJ7' - b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G= /yVOK' ? -- + b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G= /yVOK' ? ++ b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----') FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t= est_public_key_load_cycle[CryptographyECKey-ECDSAECKey] - AssertionError: a= ssert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb= 4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/= yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-= ----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqt= BfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUB= LIC KEY-----' =20=20 At index 91 diff: b't' !=3D b'\n' =20=20 Full diff: (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4= edKJ7' - b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G= /yVOK' ? -- + b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G= /yVOK' ? ++ b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----') FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t= est_private_key_load_cycle[ECDSAECKey-CryptographyECKey] - AssertionError: = assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybK= dMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END E= C PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs1= 0XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul= 9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm8= 8Q=3D=3D\n-----END EC PRIVATE KEY-----' =20=20 At index 95 diff: b'\n' !=3D b'A' =20=20 Full diff: (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM= lGniS' - b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKb' ? -- + b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKb' ? ++ - b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END= EC PRIVAT' ? -- + b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END= EC PRIVAT' ? ++ b'E KEY-----') FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t= est_private_key_load_cycle[CryptographyECKey-ECDSAECKey] - AssertionError: = assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybK= dMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END E= C PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs1= 0XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul= 9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm8= 8Q=3D=3D\n-----END EC PRIVATE KEY-----' =20=20 At index 95 diff: b'A' !=3D b'\n' =20=20 Full diff: (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM= lGniS' - b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKb' ? -- + b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKb' ? ++ - b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END= EC PRIVAT' ? -- + b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END= EC PRIVAT' ? ++ b'E KEY-----') =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D 8 failed, 447 passed= , 12 skipped in 16.14s =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D error: in phase 'check': uncaught exception: %exception #<&invoke-error program: "pytest" arguments: ("-vv") exit-status= : 1 term-signal: #f stop-signal: #f>=20 phase `check' failed after 16.4 seconds command "pytest" "-vv" failed with status 1 build process 18 exited with status 256 Best wishes, Arne =2D-=20 Unpolitisch sein hei=C3=9Ft politisch sein, ohne es zu merken. draketo.de --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQJEBAEBCAAuFiEE801qEjXQSQPNItXAE++NRSQDw+sFAmd9LEcQHGFybmVfYmFi QHdlYi5kZQAKCRAT741FJAPD6xbTD/48Ee8tiT1l95Z+iPPkWb1vsLNARS+4vWB5 C8+CxMYC8yVpTSuFHqjtaM/jOT1EuCGwyzZGNEG2b6TWfsxyLxBLAEqcwcBnVNxQ sEmziOg2a0lJ478SIsT94OJQ55qWZWotvjhGI28DVlTZbYBF3/jDcf02uWeXw9eW rUb/Q/my+wO0XHKzz19tul4zU3MzDShxQQOrH4et1PHk25LJFViKHMHiX3lmMjvl bwRgjnTV5f3jTtERG1zPlLlca/KOwSsNKgj8sR1cM8qubv4xe6HTnXq206IrZnAS W0+e8YW25TiCZJSPdSw38mnSbubQFyn/24rqu/ggG5M7CNYsj24g3Qj7GSMLMlP3 LfNrsvGfazNDAhD3/X9p67qaJ971JuZiuR7VeaxmW8Uxn1qf+BfFy3B7qGBjvp7j eXqI1OSbzFgAJEpJ97YWnDJesdC8T3A16CLGdoQvkeYfCqFBcciAT1I940/BhcmB LeWoQn7NzBrHMdaZXjSWpRRqhPCgXpW/f3+7cwjK084LZuOVa/6Hkt5Ur66pk6IR mVnvF5U5StvSv3la8xrdQ/ugIpNF5jLLIUoA1jTCDsxkcL7oz15DG+kAHdvEh+80 5AiBaqkoTvsQy3lCrQuT6KQxwUqxK8HOXLuHkJxZLLf7VRRyDvqwZgwCs7KGl/Cx UBR7/J/pGIjEBAEBCAAuFiEE3Si95tmHXKvOSosd3M8NswvBBUgFAmd9LEgQHGFy bmVfYmFiQHdlYi5kZQAKCRDczw2zC8EFSJpaA/9WXiLnJ5rqZqpuYNnHBAhk78z8 CfmEv81ESU2dJXwRIgOyiBq+9yA5HYYF/UvtqlqUweCzW3dE3hbO8RGPyA+TDWux ghPKaRRQVnOj4OViHKEFZ3dR/xHyMzMuh9bRMHNXbfrlu451wQeNz9Uia8YF2RFx 4DIZPpWANEeakXV7fA== =SKhY -----END PGP SIGNATURE----- --=-=-=--
Content-Disposition: inline Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Mailer: MIME-tools 5.505 (Entity 5.505) Content-Type: text/plain; charset=utf-8 X-Loop: help-debbugs@HIDDEN From: help-debbugs@HIDDEN (GNU bug Tracking System) To: "Dr. Arne Babenhauserheide" <arne_bab@HIDDEN> Subject: bug#75419: Acknowledgement (python-celery build failed: spurious linebreaks in tests) Message-ID: <handler.75419.B.173625661128904.ack <at> debbugs.gnu.org> References: <87wmf6bvll.fsf@HIDDEN> X-Gnu-PR-Message: ack 75419 X-Gnu-PR-Package: guix Reply-To: 75419 <at> debbugs.gnu.org Date: Tue, 07 Jan 2025 13:31:02 +0000 Thank you for filing a new bug report with debbugs.gnu.org. This is an automatically generated reply to let you know your message has been received. Your message is being forwarded to the package maintainers and other interested parties for their attention; they will reply in due course. Your message has been sent to the package maintainer(s): bug-guix@HIDDEN If you wish to submit further information on this problem, please send it to 75419 <at> debbugs.gnu.org. Please do not send mail to help-debbugs@HIDDEN unless you wish to report a problem with the Bug-tracking system. --=20 75419: https://debbugs.gnu.org/cgi/bugreport.cgi?bug=3D75419 GNU Bug Tracking System Contact help-debbugs@HIDDEN with problems
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd,
1994-97 Ian Jackson.