X-Loop: help-debbugs@HIDDEN
Subject: bug#75419: python-celery build failed: spurious linebreaks in tests
Resent-From: "Dr. Arne Babenhauserheide" <arne_bab@HIDDEN>
Original-Sender: "Debbugs-submit" <debbugs-submit-bounces <at> debbugs.gnu.org>
Resent-CC: bug-guix@HIDDEN
Resent-Date: Tue, 07 Jan 2025 13:31:02 +0000
Resent-Message-ID: <handler.75419.B.173625661128904 <at> debbugs.gnu.org>
Resent-Sender: help-debbugs@HIDDEN
X-GNU-PR-Message: report 75419
X-GNU-PR-Package: guix
X-GNU-PR-Keywords:
To: 75419 <at> debbugs.gnu.org
X-Debbugs-Original-To: bug-guix@HIDDEN
Received: via spool by submit <at> debbugs.gnu.org id=B.173625661128904
(code B ref -1); Tue, 07 Jan 2025 13:31:02 +0000
Received: (at submit) by debbugs.gnu.org; 7 Jan 2025 13:30:11 +0000
Received: from localhost ([127.0.0.1]:42090 helo=debbugs.gnu.org)
by debbugs.gnu.org with esmtp (Exim 4.84_2)
(envelope-from <debbugs-submit-bounces <at> debbugs.gnu.org>)
id 1tV9er-0007V6-Il
for submit <at> debbugs.gnu.org; Tue, 07 Jan 2025 08:30:11 -0500
Received: from lists.gnu.org ([2001:470:142::17]:37062)
by debbugs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
(Exim 4.84_2) (envelope-from <arne_bab@HIDDEN>) id 1tV9en-0007Tc-Na
for submit <at> debbugs.gnu.org; Tue, 07 Jan 2025 08:30:07 -0500
Received: from eggs.gnu.org ([2001:470:142:3::10])
by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
(Exim 4.90_1) (envelope-from <arne_bab@HIDDEN>) id 1tV9ee-0000N0-4T
for bug-guix@HIDDEN; Tue, 07 Jan 2025 08:29:58 -0500
Received: from mout.web.de ([212.227.15.3])
by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
(Exim 4.90_1) (envelope-from <arne_bab@HIDDEN>) id 1tV9ea-0002Jt-1s
for bug-guix@HIDDEN; Tue, 07 Jan 2025 08:29:55 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=web.de;
s=s29768273; t=1736256585; x=1736861385; i=arne_bab@HIDDEN;
bh=6fSm4uwBusMGi879gkL0leYix0ORwHVy9NyAQYRKqnQ=;
h=X-UI-Sender-Class:From:To:Subject:Date:Message-ID:MIME-Version:
Content-Type:cc:content-transfer-encoding:content-type:date:from:
message-id:mime-version:reply-to:subject:to;
b=aPTZQS/Xr+pCkBHGp6xAeNXgOpxL4qagMxLSZpoBRup8Ra+gVA53LpBcFoKdMBqx
EKncumQWQh0k+PCo93lEBT/Aos2e5lxCR/duZjeOMVZAMYUPZ5GXuL/la0hdoxCAK
a44oMpR+6ZwhTqvcRubQjXsFrJFRv5MdN+9USH4z9X0R5ohThr6VzzCt5zsTzIECj
0RFBA5kkm/nmxI3GodysEdHH9s9WBpm0h5GDnxtMBWVLYryrwyJmjLL8HwNxBzrU2
pcXj2ZJPMC6SJVtMJBw+JoKSTpy5iYQuxhA4JB93TtX4YaGriYLXj3zcADXZ28CyZ
gDOGyBDP6uz+0uGfoQ==
X-UI-Sender-Class: 814a7b36-bfc1-4dae-8640-3722d8ec6cd6
Received: from fluss ([84.165.21.171]) by smtp.web.de (mrweb005
[213.165.67.108]) with ESMTPSA (Nemesis) id 1MpCqh-1toEvm2HhX-00ntFb; Tue, 07
Jan 2025 14:29:45 +0100
From: "Dr. Arne Babenhauserheide" <arne_bab@HIDDEN>
User-Agent: mu4e 1.12.7; emacs 30.0.91
Date: Tue, 07 Jan 2025 14:29:42 +0100
Message-ID: <87wmf6bvll.fsf@HIDDEN>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-=";
micalg=pgp-sha256; protocol="application/pgp-signature"
X-Provags-ID: V03:K1:K3glV+rOkalkS1ZljoGfRiBM+sZBwcDfe1fpHZMWAGjIvo/gYxP
ZjDMYrCD7ZyBZIbPu/RncpH4VNYu9cxf9Qs6/8yKz/Dahb9o4wMvt0I0eBUu4KJYrn9Q5ux
MePVBwM24sX7n1r39Um94H/TNNxl01KRr+LdJvsMkBXoecczNgtBc30nRrXRm91+grBI/pC
15cDmRHTyj1eUY0Z3g/iA==
X-Spam-Flag: NO
UI-OutboundReport: notjunk:1;M01:P0:Rc+BXNUlQYk=;0GevpoYnRRwG2heTXHQ7JL37WYI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Received-SPF: pass client-ip=212.227.15.3; envelope-from=arne_bab@HIDDEN;
helo=mout.web.de
X-Spam_score_int: -27
X-Spam_score: -2.8
X-Spam_bar: --
X-Spam_report: (-2.8 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,
DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001,
RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001,
RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001,
SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no
X-Spam_action: no action
X-Spam-Score: 0.0 (/)
X-BeenThere: debbugs-submit <at> debbugs.gnu.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: <debbugs-submit.debbugs.gnu.org>
List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>,
<mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=unsubscribe>
List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/>
List-Post: <mailto:debbugs-submit <at> debbugs.gnu.org>
List-Help: <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=help>
List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>,
<mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=subscribe>
Errors-To: debbugs-submit-bounces <at> debbugs.gnu.org
Sender: "Debbugs-submit" <debbugs-submit-bounces <at> debbugs.gnu.org>
X-Spam-Score: -1.0 (-)
--=-=-=
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
The build of python-celery fails because test
TestBackendEcdsaCompatibility.test_public_key_to_pem[ECDSAECKey-Cryptograph=
yECKey] fails.
The reason seems to be that linebreaks are inserted at different places
than expected. End of the logfile
/var/log/guix/drvs/fx/d67zlmgm6mh90pdc4db8j22l47r15l-python-jose-3.3.0.drv.=
gz:
tests/test_utils.py::TestUtils::test_long_to_base64 PASSED [1=
00%]
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D FAILURES =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
_ TestBackendEcdsaCompatibility.test_public_key_to_pem[ECDSAECKey-Cryptogra=
phyECKey] _
self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff54111e0>
BackendFrom =3D <class 'jose.backends.cryptography_backend.CryptographyECKe=
y'>
BackendTo =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>
@pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
@pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
def test_public_key_to_pem(self, BackendFrom, BackendTo):
key =3D BackendFrom(private_key, ALGORITHMS.ES256)
key2 =3D BackendTo(private_key, ALGORITHMS.ES256)
=20=20=20=20
> assert key.public_key().to_pem().strip() =3D=3D key2.public_key().t=
o_pem().strip()
E AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj=
0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+=
DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D=
b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ=
7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn=
Tm88Q=3D=3D\n-----END PUBLIC KEY-----'
E=20=20=20=20=20=20=20=20=20
E At index 91 diff: b'\n' !=3D b't'
E=20=20=20=20=20=20=20=20=20
E Full diff:
E (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD=
QgAE7gb4edKJ7'
E - b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E ? --
E + b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E ? ++
E b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')
tests/algorithms/test_EC_compat.py:40: AssertionError
_ TestBackendEcdsaCompatibility.test_public_key_to_pem[CryptographyECKey-EC=
DSAECKey] _
self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5411c00>
BackendFrom =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>
BackendTo =3D <class 'jose.backends.cryptography_backend.CryptographyECKey'>
@pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
@pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
def test_public_key_to_pem(self, BackendFrom, BackendTo):
key =3D BackendFrom(private_key, ALGORITHMS.ES256)
key2 =3D BackendTo(private_key, ALGORITHMS.ES256)
=20=20=20=20
> assert key.public_key().to_pem().strip() =3D=3D key2.public_key().t=
o_pem().strip()
E AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj=
0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+=
DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D=
b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ=
7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn=
Tm88Q=3D=3D\n-----END PUBLIC KEY-----'
E=20=20=20=20=20=20=20=20=20
E At index 91 diff: b't' !=3D b'\n'
E=20=20=20=20=20=20=20=20=20
E Full diff:
E (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD=
QgAE7gb4edKJ7'
E - b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E ? --
E + b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E ? ++
E b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')
tests/algorithms/test_EC_compat.py:40: AssertionError
_ TestBackendEcdsaCompatibility.test_private_key_to_pem[ECDSAECKey-Cryptogr=
aphyECKey] _
self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5410e20>
BackendFrom =3D <class 'jose.backends.cryptography_backend.CryptographyECKe=
y'>
BackendTo =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>
@pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
@pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
def test_private_key_to_pem(self, BackendFrom, BackendTo):
key =3D BackendFrom(private_key, ALGORITHMS.ES256)
key2 =3D BackendTo(private_key, ALGORITHMS.ES256)
=20=20=20=20
> assert key.to_pem().strip() =3D=3D key2.to_pem().strip()
E AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO=
iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edK=
J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOK=
nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE =
KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49A=
wEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIOR=
lPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----'
E=20=20=20=20=20=20=20=20=20
E At index 95 diff: b'\n' !=3D b'A'
E=20=20=20=20=20=20=20=20=20
E Full diff:
E (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR=
mzYybKdMlGniS'
E - b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E ? --
E + b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E ? ++
E - b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E ? --
E + b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E ? ++
E b'E KEY-----')
tests/algorithms/test_EC_compat.py:48: AssertionError
_ TestBackendEcdsaCompatibility.test_private_key_to_pem[CryptographyECKey-E=
CDSAECKey] _
self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff54137f0>
BackendFrom =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>
BackendTo =3D <class 'jose.backends.cryptography_backend.CryptographyECKey'>
@pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
@pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
def test_private_key_to_pem(self, BackendFrom, BackendTo):
key =3D BackendFrom(private_key, ALGORITHMS.ES256)
key2 =3D BackendTo(private_key, ALGORITHMS.ES256)
=20=20=20=20
> assert key.to_pem().strip() =3D=3D key2.to_pem().strip()
E AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO=
iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edK=
J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOK=
nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE =
KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\=
nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWI=
ORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----'
E=20=20=20=20=20=20=20=20=20
E At index 95 diff: b'A' !=3D b'\n'
E=20=20=20=20=20=20=20=20=20
E Full diff:
E (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR=
mzYybKdMlGniS'
E - b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E ? --
E + b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E ? ++
E - b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E ? --
E + b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E ? ++
E b'E KEY-----')
tests/algorithms/test_EC_compat.py:48: AssertionError
_ TestBackendEcdsaCompatibility.test_public_key_load_cycle[ECDSAECKey-Crypt=
ographyECKey] _
self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5411b10>
BackendFrom =3D <class 'jose.backends.cryptography_backend.CryptographyECKe=
y'>
BackendTo =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>
@pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
@pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
def test_public_key_load_cycle(self, BackendFrom, BackendTo):
key =3D BackendFrom(private_key, ALGORITHMS.ES256)
pubkey =3D key.public_key()
=20=20=20=20
pub_pem_source =3D pubkey.to_pem().strip()
=20=20=20=20
pub_target =3D BackendTo(pub_pem_source, ALGORITHMS.ES256)
=20=20=20=20
> assert pub_pem_source =3D=3D pub_target.to_pem().strip()
E AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj=
0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+=
DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D=
b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ=
7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn=
Tm88Q=3D=3D\n-----END PUBLIC KEY-----'
E=20=20=20=20=20=20=20=20=20
E At index 91 diff: b'\n' !=3D b't'
E=20=20=20=20=20=20=20=20=20
E Full diff:
E (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD=
QgAE7gb4edKJ7'
E - b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E ? --
E + b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E ? ++
E b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')
tests/algorithms/test_EC_compat.py:60: AssertionError
_ TestBackendEcdsaCompatibility.test_public_key_load_cycle[CryptographyECKe=
y-ECDSAECKey] _
self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5410c70>
BackendFrom =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>
BackendTo =3D <class 'jose.backends.cryptography_backend.CryptographyECKey'>
@pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
@pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
def test_public_key_load_cycle(self, BackendFrom, BackendTo):
key =3D BackendFrom(private_key, ALGORITHMS.ES256)
pubkey =3D key.public_key()
=20=20=20=20
pub_pem_source =3D pubkey.to_pem().strip()
=20=20=20=20
pub_target =3D BackendTo(pub_pem_source, ALGORITHMS.ES256)
=20=20=20=20
> assert pub_pem_source =3D=3D pub_target.to_pem().strip()
E AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj=
0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+=
DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D=
b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ=
7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn=
Tm88Q=3D=3D\n-----END PUBLIC KEY-----'
E=20=20=20=20=20=20=20=20=20
E At index 91 diff: b't' !=3D b'\n'
E=20=20=20=20=20=20=20=20=20
E Full diff:
E (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD=
QgAE7gb4edKJ7'
E - b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E ? --
E + b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E ? ++
E b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')
tests/algorithms/test_EC_compat.py:60: AssertionError
_ TestBackendEcdsaCompatibility.test_private_key_load_cycle[ECDSAECKey-Cryp=
tographyECKey] _
self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5411f00>
BackendFrom =3D <class 'jose.backends.cryptography_backend.CryptographyECKe=
y'>
BackendTo =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>
@pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
@pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
def test_private_key_load_cycle(self, BackendFrom, BackendTo):
key =3D BackendFrom(private_key, ALGORITHMS.ES256)
=20=20=20=20
pem_source =3D key.to_pem().strip()
=20=20=20=20
target =3D BackendTo(pem_source, ALGORITHMS.ES256)
=20=20=20=20
> assert pem_source =3D=3D target.to_pem().strip()
E AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO=
iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edK=
J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOK=
nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE =
KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49A=
wEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIOR=
lPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----'
E=20=20=20=20=20=20=20=20=20
E At index 95 diff: b'\n' !=3D b'A'
E=20=20=20=20=20=20=20=20=20
E Full diff:
E (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR=
mzYybKdMlGniS'
E - b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E ? --
E + b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E ? ++
E - b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E ? --
E + b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E ? ++
E b'E KEY-----')
tests/algorithms/test_EC_compat.py:71: AssertionError
_ TestBackendEcdsaCompatibility.test_private_key_load_cycle[CryptographyECK=
ey-ECDSAECKey] _
self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5412d40>
BackendFrom =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>
BackendTo =3D <class 'jose.backends.cryptography_backend.CryptographyECKey'>
@pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
@pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
def test_private_key_load_cycle(self, BackendFrom, BackendTo):
key =3D BackendFrom(private_key, ALGORITHMS.ES256)
=20=20=20=20
pem_source =3D key.to_pem().strip()
=20=20=20=20
target =3D BackendTo(pem_source, ALGORITHMS.ES256)
=20=20=20=20
> assert pem_source =3D=3D target.to_pem().strip()
E AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO=
iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edK=
J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOK=
nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE =
KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\=
nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWI=
ORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----'
E=20=20=20=20=20=20=20=20=20
E At index 95 diff: b'A' !=3D b'\n'
E=20=20=20=20=20=20=20=20=20
E Full diff:
E (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR=
mzYybKdMlGniS'
E - b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E ? --
E + b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E ? ++
E - b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E ? --
E + b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E ? ++
E b'E KEY-----')
tests/algorithms/test_EC_compat.py:71: AssertionError
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D short test summary info =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_public_key_to_pem[ECDSAECKey-CryptographyECKey] - AssertionError: asser=
t b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edK=
J7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOK=
nTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-----=
\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKbo=
a71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC =
KEY-----'
=20=20
At index 91 diff: b'\n' !=3D b't'
=20=20
Full diff:
(b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4=
edKJ7'
- b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
? --
+ b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
? ++
b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_public_key_to_pem[CryptographyECKey-ECDSAECKey] - AssertionError: asser=
t b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edK=
J7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOK=
nTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-----=
\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRK=
boa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC =
KEY-----'
=20=20
At index 91 diff: b't' !=3D b'\n'
=20=20
Full diff:
(b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4=
edKJ7'
- b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
? --
+ b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
? ++
b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_private_key_to_pem[ECDSAECKey-CryptographyECKey] - AssertionError: asse=
rt b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlG=
niSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRK=
boa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END EC PR=
IVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnB=
lfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9Igo=
mCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=
=3D=3D\n-----END EC PRIVATE KEY-----'
=20=20
At index 95 diff: b'\n' !=3D b'A'
=20=20
Full diff:
(b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM=
lGniS'
- b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
? --
+ b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
? ++
- b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END=
EC PRIVAT'
? --
+ b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END=
EC PRIVAT'
? ++
b'E KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_private_key_to_pem[CryptographyECKey-ECDSAECKey] - AssertionError: asse=
rt b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlG=
niSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRK=
boa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END EC PR=
IVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnB=
lfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9Igo=
mCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=
=3D=3D\n-----END EC PRIVATE KEY-----'
=20=20
At index 95 diff: b'A' !=3D b'\n'
=20=20
Full diff:
(b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM=
lGniS'
- b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
? --
+ b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
? ++
- b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END=
EC PRIVAT'
? --
+ b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END=
EC PRIVAT'
? ++
b'E KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_public_key_load_cycle[ECDSAECKey-CryptographyECKey] - AssertionError: a=
ssert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb=
4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/=
yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-=
----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBf=
RKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUB=
LIC KEY-----'
=20=20
At index 91 diff: b'\n' !=3D b't'
=20=20
Full diff:
(b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4=
edKJ7'
- b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
? --
+ b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
? ++
b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_public_key_load_cycle[CryptographyECKey-ECDSAECKey] - AssertionError: a=
ssert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb=
4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/=
yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-=
----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqt=
BfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUB=
LIC KEY-----'
=20=20
At index 91 diff: b't' !=3D b'\n'
=20=20
Full diff:
(b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4=
edKJ7'
- b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
? --
+ b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
? ++
b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_private_key_load_cycle[ECDSAECKey-CryptographyECKey] - AssertionError: =
assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybK=
dMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END E=
C PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs1=
0XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul=
9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm8=
8Q=3D=3D\n-----END EC PRIVATE KEY-----'
=20=20
At index 95 diff: b'\n' !=3D b'A'
=20=20
Full diff:
(b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM=
lGniS'
- b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
? --
+ b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
? ++
- b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END=
EC PRIVAT'
? --
+ b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END=
EC PRIVAT'
? ++
b'E KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_private_key_load_cycle[CryptographyECKey-ECDSAECKey] - AssertionError: =
assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybK=
dMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END E=
C PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs1=
0XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul=
9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm8=
8Q=3D=3D\n-----END EC PRIVATE KEY-----'
=20=20
At index 95 diff: b'A' !=3D b'\n'
=20=20
Full diff:
(b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM=
lGniS'
- b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
? --
+ b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
? ++
- b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END=
EC PRIVAT'
? --
+ b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END=
EC PRIVAT'
? ++
b'E KEY-----')
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D 8 failed, 447 passed=
, 12 skipped in 16.14s =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D
error: in phase 'check': uncaught exception:
%exception #<&invoke-error program: "pytest" arguments: ("-vv") exit-status=
: 1 term-signal: #f stop-signal: #f>=20
phase `check' failed after 16.4 seconds
command "pytest" "-vv" failed with status 1
build process 18 exited with status 256
Best wishes,
Arne
=2D-=20
Unpolitisch sein
hei=C3=9Ft politisch sein,
ohne es zu merken.
draketo.de
--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQJEBAEBCAAuFiEE801qEjXQSQPNItXAE++NRSQDw+sFAmd9LEcQHGFybmVfYmFi
QHdlYi5kZQAKCRAT741FJAPD6xbTD/48Ee8tiT1l95Z+iPPkWb1vsLNARS+4vWB5
C8+CxMYC8yVpTSuFHqjtaM/jOT1EuCGwyzZGNEG2b6TWfsxyLxBLAEqcwcBnVNxQ
sEmziOg2a0lJ478SIsT94OJQ55qWZWotvjhGI28DVlTZbYBF3/jDcf02uWeXw9eW
rUb/Q/my+wO0XHKzz19tul4zU3MzDShxQQOrH4et1PHk25LJFViKHMHiX3lmMjvl
bwRgjnTV5f3jTtERG1zPlLlca/KOwSsNKgj8sR1cM8qubv4xe6HTnXq206IrZnAS
W0+e8YW25TiCZJSPdSw38mnSbubQFyn/24rqu/ggG5M7CNYsj24g3Qj7GSMLMlP3
LfNrsvGfazNDAhD3/X9p67qaJ971JuZiuR7VeaxmW8Uxn1qf+BfFy3B7qGBjvp7j
eXqI1OSbzFgAJEpJ97YWnDJesdC8T3A16CLGdoQvkeYfCqFBcciAT1I940/BhcmB
LeWoQn7NzBrHMdaZXjSWpRRqhPCgXpW/f3+7cwjK084LZuOVa/6Hkt5Ur66pk6IR
mVnvF5U5StvSv3la8xrdQ/ugIpNF5jLLIUoA1jTCDsxkcL7oz15DG+kAHdvEh+80
5AiBaqkoTvsQy3lCrQuT6KQxwUqxK8HOXLuHkJxZLLf7VRRyDvqwZgwCs7KGl/Cx
UBR7/J/pGIjEBAEBCAAuFiEE3Si95tmHXKvOSosd3M8NswvBBUgFAmd9LEgQHGFy
bmVfYmFiQHdlYi5kZQAKCRDczw2zC8EFSJpaA/9WXiLnJ5rqZqpuYNnHBAhk78z8
CfmEv81ESU2dJXwRIgOyiBq+9yA5HYYF/UvtqlqUweCzW3dE3hbO8RGPyA+TDWux
ghPKaRRQVnOj4OViHKEFZ3dR/xHyMzMuh9bRMHNXbfrlu451wQeNz9Uia8YF2RFx
4DIZPpWANEeakXV7fA==
=SKhY
-----END PGP SIGNATURE-----
--=-=-=--
Content-Disposition: inline Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Mailer: MIME-tools 5.505 (Entity 5.505) Content-Type: text/plain; charset=utf-8 X-Loop: help-debbugs@HIDDEN From: help-debbugs@HIDDEN (GNU bug Tracking System) To: "Dr. Arne Babenhauserheide" <arne_bab@HIDDEN> Subject: bug#75419: Acknowledgement (python-celery build failed: spurious linebreaks in tests) Message-ID: <handler.75419.B.173625661128904.ack <at> debbugs.gnu.org> References: <87wmf6bvll.fsf@HIDDEN> X-Gnu-PR-Message: ack 75419 X-Gnu-PR-Package: guix Reply-To: 75419 <at> debbugs.gnu.org Date: Tue, 07 Jan 2025 13:31:02 +0000 Thank you for filing a new bug report with debbugs.gnu.org. This is an automatically generated reply to let you know your message has been received. Your message is being forwarded to the package maintainers and other interested parties for their attention; they will reply in due course. Your message has been sent to the package maintainer(s): bug-guix@HIDDEN If you wish to submit further information on this problem, please send it to 75419 <at> debbugs.gnu.org. Please do not send mail to help-debbugs@HIDDEN unless you wish to report a problem with the Bug-tracking system. --=20 75419: https://debbugs.gnu.org/cgi/bugreport.cgi?bug=3D75419 GNU Bug Tracking System Contact help-debbugs@HIDDEN with problems
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd,
1994-97 Ian Jackson.