GNU logs - #75419, boring messages


Message sent to bug-guix@HIDDEN:


X-Loop: help-debbugs@HIDDEN
Subject: bug#75419: python-celery build failed: spurious linebreaks in tests
Resent-From: "Dr. Arne Babenhauserheide" <arne_bab@HIDDEN>
Original-Sender: "Debbugs-submit" <debbugs-submit-bounces <at> debbugs.gnu.org>
Resent-CC: bug-guix@HIDDEN
Resent-Date: Tue, 07 Jan 2025 13:31:02 +0000
Resent-Message-ID: <handler.75419.B.173625661128904 <at> debbugs.gnu.org>
Resent-Sender: help-debbugs@HIDDEN
X-GNU-PR-Message: report 75419
X-GNU-PR-Package: guix
X-GNU-PR-Keywords: 
To: 75419 <at> debbugs.gnu.org
X-Debbugs-Original-To: bug-guix@HIDDEN
Received: via spool by submit <at> debbugs.gnu.org id=B.173625661128904
          (code B ref -1); Tue, 07 Jan 2025 13:31:02 +0000
Received: (at submit) by debbugs.gnu.org; 7 Jan 2025 13:30:11 +0000
Received: from localhost ([127.0.0.1]:42090 helo=debbugs.gnu.org)
	by debbugs.gnu.org with esmtp (Exim 4.84_2)
	(envelope-from <debbugs-submit-bounces <at> debbugs.gnu.org>)
	id 1tV9er-0007V6-Il
	for submit <at> debbugs.gnu.org; Tue, 07 Jan 2025 08:30:11 -0500
Received: from lists.gnu.org ([2001:470:142::17]:37062)
 by debbugs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.84_2) (envelope-from <arne_bab@HIDDEN>) id 1tV9en-0007Tc-Na
 for submit <at> debbugs.gnu.org; Tue, 07 Jan 2025 08:30:07 -0500
Received: from eggs.gnu.org ([2001:470:142:3::10])
 by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.90_1) (envelope-from <arne_bab@HIDDEN>) id 1tV9ee-0000N0-4T
 for bug-guix@HIDDEN; Tue, 07 Jan 2025 08:29:58 -0500
Received: from mout.web.de ([212.227.15.3])
 by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.90_1) (envelope-from <arne_bab@HIDDEN>) id 1tV9ea-0002Jt-1s
 for bug-guix@HIDDEN; Tue, 07 Jan 2025 08:29:55 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=web.de;
 s=s29768273; t=1736256585; x=1736861385; i=arne_bab@HIDDEN;
 bh=6fSm4uwBusMGi879gkL0leYix0ORwHVy9NyAQYRKqnQ=;
 h=X-UI-Sender-Class:From:To:Subject:Date:Message-ID:MIME-Version:
 Content-Type:cc:content-transfer-encoding:content-type:date:from:
 message-id:mime-version:reply-to:subject:to;
 b=aPTZQS/Xr+pCkBHGp6xAeNXgOpxL4qagMxLSZpoBRup8Ra+gVA53LpBcFoKdMBqx
 EKncumQWQh0k+PCo93lEBT/Aos2e5lxCR/duZjeOMVZAMYUPZ5GXuL/la0hdoxCAK
 a44oMpR+6ZwhTqvcRubQjXsFrJFRv5MdN+9USH4z9X0R5ohThr6VzzCt5zsTzIECj
 0RFBA5kkm/nmxI3GodysEdHH9s9WBpm0h5GDnxtMBWVLYryrwyJmjLL8HwNxBzrU2
 pcXj2ZJPMC6SJVtMJBw+JoKSTpy5iYQuxhA4JB93TtX4YaGriYLXj3zcADXZ28CyZ
 gDOGyBDP6uz+0uGfoQ==
X-UI-Sender-Class: 814a7b36-bfc1-4dae-8640-3722d8ec6cd6
Received: from fluss ([84.165.21.171]) by smtp.web.de (mrweb005
 [213.165.67.108]) with ESMTPSA (Nemesis) id 1MpCqh-1toEvm2HhX-00ntFb; Tue, 07
 Jan 2025 14:29:45 +0100
From: "Dr. Arne Babenhauserheide" <arne_bab@HIDDEN>
User-Agent: mu4e 1.12.7; emacs 30.0.91
Date: Tue, 07 Jan 2025 14:29:42 +0100
Message-ID: <87wmf6bvll.fsf@HIDDEN>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-=";
 micalg=pgp-sha256; protocol="application/pgp-signature"
X-Provags-ID: V03:K1:K3glV+rOkalkS1ZljoGfRiBM+sZBwcDfe1fpHZMWAGjIvo/gYxP
 ZjDMYrCD7ZyBZIbPu/RncpH4VNYu9cxf9Qs6/8yKz/Dahb9o4wMvt0I0eBUu4KJYrn9Q5ux
 MePVBwM24sX7n1r39Um94H/TNNxl01KRr+LdJvsMkBXoecczNgtBc30nRrXRm91+grBI/pC
 15cDmRHTyj1eUY0Z3g/iA==
X-Spam-Flag: NO
UI-OutboundReport: notjunk:1;M01:P0:Rc+BXNUlQYk=;0GevpoYnRRwG2heTXHQ7JL37WYI
 AbGcIU6qTPEv/bvwXLsRgJfS766FIERmL4LXdFRg+REU8IHmHdPfTcTm5Zze4ZfiOuZKlQXwI
 ytnEngF/StFQx2yUehV2IVVa6/ahChbUkC+Tj3wQYqsAYgCu34mN+7aWL7zdnjhSJZoZLGnhA
 F9H/x5Pwlc8lbUq7+uYRKyq6GZnsu0gXgb3Q7Y9oSYlWpM60bQw6RM2y8vc+EvdfxW5Mrn09T
 6tH+dc4reGhl5hKIEXWqaYaxZsJSz2VGAukf9Rr86ofkmr4MZiJ9V6/pmNIaAJ3IMu1TvET8h
 AirgLdzEvKsHGMcPbw2xNx9igxBHYzYtWV6SXrk4L3TaIMY8Pel3AQkn5RIYxHiTyEMxJLYzB
 jNEloVdOOGFo+MiWohRORGjh7gHbPJ+bHD+g5g7qlTfhFcnRjS6R2XkTaAcynKWTPeLabDXnW
 urQOhtPZVhbahvqirZlCj/BIHvbEbPHMFLMTrvwmyDZUeESTnRBSgH6kQC17y2wjstUA1gC3s
 w3IbpQWv6XpvDmywjy6S3Tf3ayYf3rhTCCeceg0fBNimCOxvDxRlHs3Ozg3ROWN/53o1+9gCu
 BClseAmbWF6pEO0C7esKHjKuQ/6MerogBcBgeFgEME2Bxmm/2eXIXGr4hxVBtpYmJWZMxDpM7
 sfwZvWDx8S58fBdYrv0g2c+SpCFZW8C1iREWVwK7hcAj8JMIgP0MH38Tll9+1QIFuvcZuhMND
 Ko9IG3Zvkt/5l7sDq0xmg4nLNOPRtRMFtEPWbDWE+vxVO+F8Nx2CrNi9qCq7QJ5Pdozl4TABb
 cY0+A85OneAEd0ALnoceP6MK3hbaqYsc91bSwUpp3RsfZ/vgRZlIzW78984tkxApdD6p5rXPm
 iFGohdW3VTGlhn9Suyx8KBiq8Wtf4SxNkGVNxEBjHsMNslqbj8pfJsIMhZl4GUndkJ9s4Hyjz
 gzj8/dbcqV/aJejrdL40Cu1fKC7L1uckJ9Drvx+gn1jJWXHxXe7oTF3Eem6A0102rjFvy7f8y
 ORLa8zRKgZyZsUKzprwMNkT95N5SbLGbT5ox3qhgHT4K7+9p7sGQF+DbbQeh+HXudnBG42WCc
 g+01sZFC0=
Received-SPF: pass client-ip=212.227.15.3; envelope-from=arne_bab@HIDDEN;
 helo=mout.web.de
X-Spam_score_int: -27
X-Spam_score: -2.8
X-Spam_bar: --
X-Spam_report: (-2.8 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,
 DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001,
 RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001,
 RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001,
 SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no
X-Spam_action: no action
X-Spam-Score: 0.0 (/)
X-BeenThere: debbugs-submit <at> debbugs.gnu.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: <debbugs-submit.debbugs.gnu.org>
List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>, 
 <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=unsubscribe>
List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/>
List-Post: <mailto:debbugs-submit <at> debbugs.gnu.org>
List-Help: <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=help>
List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>, 
 <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=subscribe>
Errors-To: debbugs-submit-bounces <at> debbugs.gnu.org
Sender: "Debbugs-submit" <debbugs-submit-bounces <at> debbugs.gnu.org>
X-Spam-Score: -1.0 (-)

--=-=-=
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

The build of python-celery fails because test
TestBackendEcdsaCompatibility.test_public_key_to_pem[ECDSAECKey-Cryptograph=
yECKey] fails.

The reason seems to be that linebreaks are inserted at different places
than expected. End of the logfile
/var/log/guix/drvs/fx/d67zlmgm6mh90pdc4db8j22l47r15l-python-jose-3.3.0.drv.=
gz:

tests/test_utils.py::TestUtils::test_long_to_base64 PASSED               [1=
00%]

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D FAILURES =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
_ TestBackendEcdsaCompatibility.test_public_key_to_pem[ECDSAECKey-Cryptogra=
phyECKey] _

self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff54111e0>
BackendFrom =3D <class 'jose.backends.cryptography_backend.CryptographyECKe=
y'>
BackendTo =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>

    @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
    @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
    def test_public_key_to_pem(self, BackendFrom, BackendTo):
        key =3D BackendFrom(private_key, ALGORITHMS.ES256)
        key2 =3D BackendTo(private_key, ALGORITHMS.ES256)
=20=20=20=20
>       assert key.public_key().to_pem().strip() =3D=3D key2.public_key().t=
o_pem().strip()
E       AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj=
0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+=
DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D=
 b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ=
7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn=
Tm88Q=3D=3D\n-----END PUBLIC KEY-----'
E=20=20=20=20=20=20=20=20=20
E         At index 91 diff: b'\n' !=3D b't'
E=20=20=20=20=20=20=20=20=20
E         Full diff:
E           (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD=
QgAE7gb4edKJ7'
E         -  b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E         ?                                   --
E         +  b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E         ?                       ++
E            b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')

tests/algorithms/test_EC_compat.py:40: AssertionError
_ TestBackendEcdsaCompatibility.test_public_key_to_pem[CryptographyECKey-EC=
DSAECKey] _

self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5411c00>
BackendFrom =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>
BackendTo =3D <class 'jose.backends.cryptography_backend.CryptographyECKey'>

    @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
    @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
    def test_public_key_to_pem(self, BackendFrom, BackendTo):
        key =3D BackendFrom(private_key, ALGORITHMS.ES256)
        key2 =3D BackendTo(private_key, ALGORITHMS.ES256)
=20=20=20=20
>       assert key.public_key().to_pem().strip() =3D=3D key2.public_key().t=
o_pem().strip()
E       AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj=
0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+=
DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D=
 b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ=
7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn=
Tm88Q=3D=3D\n-----END PUBLIC KEY-----'
E=20=20=20=20=20=20=20=20=20
E         At index 91 diff: b't' !=3D b'\n'
E=20=20=20=20=20=20=20=20=20
E         Full diff:
E           (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD=
QgAE7gb4edKJ7'
E         -  b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E         ?                       --
E         +  b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E         ?                                   ++
E            b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')

tests/algorithms/test_EC_compat.py:40: AssertionError
_ TestBackendEcdsaCompatibility.test_private_key_to_pem[ECDSAECKey-Cryptogr=
aphyECKey] _

self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5410e20>
BackendFrom =3D <class 'jose.backends.cryptography_backend.CryptographyECKe=
y'>
BackendTo =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>

    @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
    @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
    def test_private_key_to_pem(self, BackendFrom, BackendTo):
        key =3D BackendFrom(private_key, ALGORITHMS.ES256)
        key2 =3D BackendTo(private_key, ALGORITHMS.ES256)
=20=20=20=20
>       assert key.to_pem().strip() =3D=3D key2.to_pem().strip()
E       AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO=
iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edK=
J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOK=
nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE =
KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49A=
wEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIOR=
lPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----'
E=20=20=20=20=20=20=20=20=20
E         At index 95 diff: b'\n' !=3D b'A'
E=20=20=20=20=20=20=20=20=20
E         Full diff:
E           (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR=
mzYybKdMlGniS'
E         -  b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E         ?                                       --
E         +  b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E         ?                           ++
E         -  b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E         ?                                            --
E         +  b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E         ?                    ++
E            b'E KEY-----')

tests/algorithms/test_EC_compat.py:48: AssertionError
_ TestBackendEcdsaCompatibility.test_private_key_to_pem[CryptographyECKey-E=
CDSAECKey] _

self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff54137f0>
BackendFrom =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>
BackendTo =3D <class 'jose.backends.cryptography_backend.CryptographyECKey'>

    @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
    @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
    def test_private_key_to_pem(self, BackendFrom, BackendTo):
        key =3D BackendFrom(private_key, ALGORITHMS.ES256)
        key2 =3D BackendTo(private_key, ALGORITHMS.ES256)
=20=20=20=20
>       assert key.to_pem().strip() =3D=3D key2.to_pem().strip()
E       AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO=
iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edK=
J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOK=
nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE =
KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\=
nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWI=
ORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----'
E=20=20=20=20=20=20=20=20=20
E         At index 95 diff: b'A' !=3D b'\n'
E=20=20=20=20=20=20=20=20=20
E         Full diff:
E           (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR=
mzYybKdMlGniS'
E         -  b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E         ?                           --
E         +  b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E         ?                                       ++
E         -  b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E         ?                    --
E         +  b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E         ?                                            ++
E            b'E KEY-----')

tests/algorithms/test_EC_compat.py:48: AssertionError
_ TestBackendEcdsaCompatibility.test_public_key_load_cycle[ECDSAECKey-Crypt=
ographyECKey] _

self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5411b10>
BackendFrom =3D <class 'jose.backends.cryptography_backend.CryptographyECKe=
y'>
BackendTo =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>

    @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
    @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
    def test_public_key_load_cycle(self, BackendFrom, BackendTo):
        key =3D BackendFrom(private_key, ALGORITHMS.ES256)
        pubkey =3D key.public_key()
=20=20=20=20
        pub_pem_source =3D pubkey.to_pem().strip()
=20=20=20=20
        pub_target =3D BackendTo(pub_pem_source, ALGORITHMS.ES256)
=20=20=20=20
>       assert pub_pem_source =3D=3D pub_target.to_pem().strip()
E       AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj=
0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+=
DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D=
 b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ=
7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn=
Tm88Q=3D=3D\n-----END PUBLIC KEY-----'
E=20=20=20=20=20=20=20=20=20
E         At index 91 diff: b'\n' !=3D b't'
E=20=20=20=20=20=20=20=20=20
E         Full diff:
E           (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD=
QgAE7gb4edKJ7'
E         -  b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E         ?                                   --
E         +  b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E         ?                       ++
E            b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')

tests/algorithms/test_EC_compat.py:60: AssertionError
_ TestBackendEcdsaCompatibility.test_public_key_load_cycle[CryptographyECKe=
y-ECDSAECKey] _

self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5410c70>
BackendFrom =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>
BackendTo =3D <class 'jose.backends.cryptography_backend.CryptographyECKey'>

    @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
    @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
    def test_public_key_load_cycle(self, BackendFrom, BackendTo):
        key =3D BackendFrom(private_key, ALGORITHMS.ES256)
        pubkey =3D key.public_key()
=20=20=20=20
        pub_pem_source =3D pubkey.to_pem().strip()
=20=20=20=20
        pub_target =3D BackendTo(pub_pem_source, ALGORITHMS.ES256)
=20=20=20=20
>       assert pub_pem_source =3D=3D pub_target.to_pem().strip()
E       AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj=
0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+=
DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D=
 b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ=
7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn=
Tm88Q=3D=3D\n-----END PUBLIC KEY-----'
E=20=20=20=20=20=20=20=20=20
E         At index 91 diff: b't' !=3D b'\n'
E=20=20=20=20=20=20=20=20=20
E         Full diff:
E           (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD=
QgAE7gb4edKJ7'
E         -  b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E         ?                       --
E         +  b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E         ?                                   ++
E            b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')

tests/algorithms/test_EC_compat.py:60: AssertionError
_ TestBackendEcdsaCompatibility.test_private_key_load_cycle[ECDSAECKey-Cryp=
tographyECKey] _

self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5411f00>
BackendFrom =3D <class 'jose.backends.cryptography_backend.CryptographyECKe=
y'>
BackendTo =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>

    @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
    @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
    def test_private_key_load_cycle(self, BackendFrom, BackendTo):
        key =3D BackendFrom(private_key, ALGORITHMS.ES256)
=20=20=20=20
        pem_source =3D key.to_pem().strip()
=20=20=20=20
        target =3D BackendTo(pem_source, ALGORITHMS.ES256)
=20=20=20=20
>       assert pem_source =3D=3D target.to_pem().strip()
E       AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO=
iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edK=
J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOK=
nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE =
KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49A=
wEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIOR=
lPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----'
E=20=20=20=20=20=20=20=20=20
E         At index 95 diff: b'\n' !=3D b'A'
E=20=20=20=20=20=20=20=20=20
E         Full diff:
E           (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR=
mzYybKdMlGniS'
E         -  b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E         ?                                       --
E         +  b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E         ?                           ++
E         -  b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E         ?                                            --
E         +  b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E         ?                    ++
E            b'E KEY-----')

tests/algorithms/test_EC_compat.py:71: AssertionError
_ TestBackendEcdsaCompatibility.test_private_key_load_cycle[CryptographyECK=
ey-ECDSAECKey] _

self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5412d40>
BackendFrom =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>
BackendTo =3D <class 'jose.backends.cryptography_backend.CryptographyECKey'>

    @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
    @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
    def test_private_key_load_cycle(self, BackendFrom, BackendTo):
        key =3D BackendFrom(private_key, ALGORITHMS.ES256)
=20=20=20=20
        pem_source =3D key.to_pem().strip()
=20=20=20=20
        target =3D BackendTo(pem_source, ALGORITHMS.ES256)
=20=20=20=20
>       assert pem_source =3D=3D target.to_pem().strip()
E       AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO=
iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edK=
J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOK=
nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE =
KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\=
nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWI=
ORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----'
E=20=20=20=20=20=20=20=20=20
E         At index 95 diff: b'A' !=3D b'\n'
E=20=20=20=20=20=20=20=20=20
E         Full diff:
E           (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR=
mzYybKdMlGniS'
E         -  b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E         ?                           --
E         +  b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E         ?                                       ++
E         -  b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E         ?                    --
E         +  b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E         ?                                            ++
E            b'E KEY-----')

tests/algorithms/test_EC_compat.py:71: AssertionError
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D short test summary info =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_public_key_to_pem[ECDSAECKey-CryptographyECKey] - AssertionError: asser=
t b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edK=
J7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOK=
nTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-----=
\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKbo=
a71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC =
KEY-----'
=20=20
  At index 91 diff: b'\n' !=3D b't'
=20=20
  Full diff:
    (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4=
edKJ7'
  -  b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
  ?                                   --
  +  b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
  ?                       ++
     b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_public_key_to_pem[CryptographyECKey-ECDSAECKey] - AssertionError: asser=
t b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edK=
J7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOK=
nTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-----=
\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRK=
boa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC =
KEY-----'
=20=20
  At index 91 diff: b't' !=3D b'\n'
=20=20
  Full diff:
    (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4=
edKJ7'
  -  b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
  ?                       --
  +  b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
  ?                                   ++
     b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_private_key_to_pem[ECDSAECKey-CryptographyECKey] - AssertionError: asse=
rt b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlG=
niSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRK=
boa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END EC PR=
IVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnB=
lfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9Igo=
mCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=
=3D=3D\n-----END EC PRIVATE KEY-----'
=20=20
  At index 95 diff: b'\n' !=3D b'A'
=20=20
  Full diff:
    (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM=
lGniS'
  -  b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
  ?                                       --
  +  b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
  ?                           ++
  -  b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END=
 EC PRIVAT'
  ?                                            --
  +  b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END=
 EC PRIVAT'
  ?                    ++
     b'E KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_private_key_to_pem[CryptographyECKey-ECDSAECKey] - AssertionError: asse=
rt b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlG=
niSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRK=
boa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END EC PR=
IVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnB=
lfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9Igo=
mCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=
=3D=3D\n-----END EC PRIVATE KEY-----'
=20=20
  At index 95 diff: b'A' !=3D b'\n'
=20=20
  Full diff:
    (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM=
lGniS'
  -  b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
  ?                           --
  +  b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
  ?                                       ++
  -  b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END=
 EC PRIVAT'
  ?                    --
  +  b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END=
 EC PRIVAT'
  ?                                            ++
     b'E KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_public_key_load_cycle[ECDSAECKey-CryptographyECKey] - AssertionError: a=
ssert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb=
4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/=
yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-=
----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBf=
RKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUB=
LIC KEY-----'
=20=20
  At index 91 diff: b'\n' !=3D b't'
=20=20
  Full diff:
    (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4=
edKJ7'
  -  b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
  ?                                   --
  +  b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
  ?                       ++
     b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_public_key_load_cycle[CryptographyECKey-ECDSAECKey] - AssertionError: a=
ssert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb=
4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/=
yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-=
----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqt=
BfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUB=
LIC KEY-----'
=20=20
  At index 91 diff: b't' !=3D b'\n'
=20=20
  Full diff:
    (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4=
edKJ7'
  -  b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
  ?                       --
  +  b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
  ?                                   ++
     b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_private_key_load_cycle[ECDSAECKey-CryptographyECKey] - AssertionError: =
assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybK=
dMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END E=
C PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs1=
0XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul=
9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm8=
8Q=3D=3D\n-----END EC PRIVATE KEY-----'
=20=20
  At index 95 diff: b'\n' !=3D b'A'
=20=20
  Full diff:
    (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM=
lGniS'
  -  b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
  ?                                       --
  +  b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
  ?                           ++
  -  b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END=
 EC PRIVAT'
  ?                                            --
  +  b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END=
 EC PRIVAT'
  ?                    ++
     b'E KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_private_key_load_cycle[CryptographyECKey-ECDSAECKey] - AssertionError: =
assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybK=
dMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END E=
C PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs1=
0XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul=
9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm8=
8Q=3D=3D\n-----END EC PRIVATE KEY-----'
=20=20
  At index 95 diff: b'A' !=3D b'\n'
=20=20
  Full diff:
    (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM=
lGniS'
  -  b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
  ?                           --
  +  b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
  ?                                       ++
  -  b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END=
 EC PRIVAT'
  ?                    --
  +  b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END=
 EC PRIVAT'
  ?                                            ++
     b'E KEY-----')
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D 8 failed, 447 passed=
, 12 skipped in 16.14s =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D
error: in phase 'check': uncaught exception:
%exception #<&invoke-error program: "pytest" arguments: ("-vv") exit-status=
: 1 term-signal: #f stop-signal: #f>=20
phase `check' failed after 16.4 seconds
command "pytest" "-vv" failed with status 1
build process 18 exited with status 256


Best wishes,
Arne
=2D-=20
Unpolitisch sein
hei=C3=9Ft politisch sein,
ohne es zu merken.
draketo.de

--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQJEBAEBCAAuFiEE801qEjXQSQPNItXAE++NRSQDw+sFAmd9LEcQHGFybmVfYmFi
QHdlYi5kZQAKCRAT741FJAPD6xbTD/48Ee8tiT1l95Z+iPPkWb1vsLNARS+4vWB5
C8+CxMYC8yVpTSuFHqjtaM/jOT1EuCGwyzZGNEG2b6TWfsxyLxBLAEqcwcBnVNxQ
sEmziOg2a0lJ478SIsT94OJQ55qWZWotvjhGI28DVlTZbYBF3/jDcf02uWeXw9eW
rUb/Q/my+wO0XHKzz19tul4zU3MzDShxQQOrH4et1PHk25LJFViKHMHiX3lmMjvl
bwRgjnTV5f3jTtERG1zPlLlca/KOwSsNKgj8sR1cM8qubv4xe6HTnXq206IrZnAS
W0+e8YW25TiCZJSPdSw38mnSbubQFyn/24rqu/ggG5M7CNYsj24g3Qj7GSMLMlP3
LfNrsvGfazNDAhD3/X9p67qaJ971JuZiuR7VeaxmW8Uxn1qf+BfFy3B7qGBjvp7j
eXqI1OSbzFgAJEpJ97YWnDJesdC8T3A16CLGdoQvkeYfCqFBcciAT1I940/BhcmB
LeWoQn7NzBrHMdaZXjSWpRRqhPCgXpW/f3+7cwjK084LZuOVa/6Hkt5Ur66pk6IR
mVnvF5U5StvSv3la8xrdQ/ugIpNF5jLLIUoA1jTCDsxkcL7oz15DG+kAHdvEh+80
5AiBaqkoTvsQy3lCrQuT6KQxwUqxK8HOXLuHkJxZLLf7VRRyDvqwZgwCs7KGl/Cx
UBR7/J/pGIjEBAEBCAAuFiEE3Si95tmHXKvOSosd3M8NswvBBUgFAmd9LEgQHGFy
bmVfYmFiQHdlYi5kZQAKCRDczw2zC8EFSJpaA/9WXiLnJ5rqZqpuYNnHBAhk78z8
CfmEv81ESU2dJXwRIgOyiBq+9yA5HYYF/UvtqlqUweCzW3dE3hbO8RGPyA+TDWux
ghPKaRRQVnOj4OViHKEFZ3dR/xHyMzMuh9bRMHNXbfrlu451wQeNz9Uia8YF2RFx
4DIZPpWANEeakXV7fA==
=SKhY
-----END PGP SIGNATURE-----
--=-=-=--




Message sent:


Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Mailer: MIME-tools 5.505 (Entity 5.505)
Content-Type: text/plain; charset=utf-8
X-Loop: help-debbugs@HIDDEN
From: help-debbugs@HIDDEN (GNU bug Tracking System)
To: "Dr. Arne Babenhauserheide" <arne_bab@HIDDEN>
Subject: bug#75419: Acknowledgement (python-celery build failed: spurious
 linebreaks in tests)
Message-ID: <handler.75419.B.173625661128904.ack <at> debbugs.gnu.org>
References: <87wmf6bvll.fsf@HIDDEN>
X-Gnu-PR-Message: ack 75419
X-Gnu-PR-Package: guix
Reply-To: 75419 <at> debbugs.gnu.org
Date: Tue, 07 Jan 2025 13:31:02 +0000

Thank you for filing a new bug report with debbugs.gnu.org.

This is an automatically generated reply to let you know your message
has been received.

Your message is being forwarded to the package maintainers and other
interested parties for their attention; they will reply in due course.

Your message has been sent to the package maintainer(s):
 bug-guix@HIDDEN

If you wish to submit further information on this problem, please
send it to 75419 <at> debbugs.gnu.org.

Please do not send mail to help-debbugs@HIDDEN unless you wish
to report a problem with the Bug-tracking system.

--=20
75419: https://debbugs.gnu.org/cgi/bugreport.cgi?bug=3D75419
GNU Bug Tracking System
Contact help-debbugs@HIDDEN with problems



Last modified: Sun, 12 Jan 2025 05:45:02 UTC

GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997 nCipher Corporation Ltd, 1994-97 Ian Jackson.