GNU bug report logs - #75419
python-celery build failed: spurious linebreaks in tests

Please note: This is a static page, with minimal formatting, updated once a day.
Click here to see this page with the latest information and nicer formatting.

Package: guix; Reported by: "Dr. Arne Babenhauserheide" <arne_bab@HIDDEN>; dated Tue, 7 Jan 2025 13:31:02 UTC; Maintainer for guix is bug-guix@HIDDEN.

Message received at submit <at> debbugs.gnu.org:


Received: (at submit) by debbugs.gnu.org; 7 Jan 2025 13:30:11 +0000
From debbugs-submit-bounces <at> debbugs.gnu.org Tue Jan 07 08:30:11 2025
Received: from localhost ([127.0.0.1]:42090 helo=debbugs.gnu.org)
	by debbugs.gnu.org with esmtp (Exim 4.84_2)
	(envelope-from <debbugs-submit-bounces <at> debbugs.gnu.org>)
	id 1tV9er-0007V6-Il
	for submit <at> debbugs.gnu.org; Tue, 07 Jan 2025 08:30:11 -0500
Received: from lists.gnu.org ([2001:470:142::17]:37062)
 by debbugs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.84_2) (envelope-from <arne_bab@HIDDEN>) id 1tV9en-0007Tc-Na
 for submit <at> debbugs.gnu.org; Tue, 07 Jan 2025 08:30:07 -0500
Received: from eggs.gnu.org ([2001:470:142:3::10])
 by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.90_1) (envelope-from <arne_bab@HIDDEN>) id 1tV9ee-0000N0-4T
 for bug-guix@HIDDEN; Tue, 07 Jan 2025 08:29:58 -0500
Received: from mout.web.de ([212.227.15.3])
 by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.90_1) (envelope-from <arne_bab@HIDDEN>) id 1tV9ea-0002Jt-1s
 for bug-guix@HIDDEN; Tue, 07 Jan 2025 08:29:55 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=web.de;
 s=s29768273; t=1736256585; x=1736861385; i=arne_bab@HIDDEN;
 bh=6fSm4uwBusMGi879gkL0leYix0ORwHVy9NyAQYRKqnQ=;
 h=X-UI-Sender-Class:From:To:Subject:Date:Message-ID:MIME-Version:
 Content-Type:cc:content-transfer-encoding:content-type:date:from:
 message-id:mime-version:reply-to:subject:to;
 b=aPTZQS/Xr+pCkBHGp6xAeNXgOpxL4qagMxLSZpoBRup8Ra+gVA53LpBcFoKdMBqx
 EKncumQWQh0k+PCo93lEBT/Aos2e5lxCR/duZjeOMVZAMYUPZ5GXuL/la0hdoxCAK
 a44oMpR+6ZwhTqvcRubQjXsFrJFRv5MdN+9USH4z9X0R5ohThr6VzzCt5zsTzIECj
 0RFBA5kkm/nmxI3GodysEdHH9s9WBpm0h5GDnxtMBWVLYryrwyJmjLL8HwNxBzrU2
 pcXj2ZJPMC6SJVtMJBw+JoKSTpy5iYQuxhA4JB93TtX4YaGriYLXj3zcADXZ28CyZ
 gDOGyBDP6uz+0uGfoQ==
X-UI-Sender-Class: 814a7b36-bfc1-4dae-8640-3722d8ec6cd6
Received: from fluss ([84.165.21.171]) by smtp.web.de (mrweb005
 [213.165.67.108]) with ESMTPSA (Nemesis) id 1MpCqh-1toEvm2HhX-00ntFb; Tue, 07
 Jan 2025 14:29:45 +0100
From: "Dr. Arne Babenhauserheide" <arne_bab@HIDDEN>
To: bug-guix@HIDDEN
Subject: python-celery build failed: spurious linebreaks in tests
User-Agent: mu4e 1.12.7; emacs 30.0.91
Date: Tue, 07 Jan 2025 14:29:42 +0100
Message-ID: <87wmf6bvll.fsf@HIDDEN>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-=";
 micalg=pgp-sha256; protocol="application/pgp-signature"
X-Provags-ID: V03:K1:K3glV+rOkalkS1ZljoGfRiBM+sZBwcDfe1fpHZMWAGjIvo/gYxP
 ZjDMYrCD7ZyBZIbPu/RncpH4VNYu9cxf9Qs6/8yKz/Dahb9o4wMvt0I0eBUu4KJYrn9Q5ux
 MePVBwM24sX7n1r39Um94H/TNNxl01KRr+LdJvsMkBXoecczNgtBc30nRrXRm91+grBI/pC
 15cDmRHTyj1eUY0Z3g/iA==
X-Spam-Flag: NO
UI-OutboundReport: notjunk:1;M01:P0:Rc+BXNUlQYk=;0GevpoYnRRwG2heTXHQ7JL37WYI
 AbGcIU6qTPEv/bvwXLsRgJfS766FIERmL4LXdFRg+REU8IHmHdPfTcTm5Zze4ZfiOuZKlQXwI
 ytnEngF/StFQx2yUehV2IVVa6/ahChbUkC+Tj3wQYqsAYgCu34mN+7aWL7zdnjhSJZoZLGnhA
 F9H/x5Pwlc8lbUq7+uYRKyq6GZnsu0gXgb3Q7Y9oSYlWpM60bQw6RM2y8vc+EvdfxW5Mrn09T
 6tH+dc4reGhl5hKIEXWqaYaxZsJSz2VGAukf9Rr86ofkmr4MZiJ9V6/pmNIaAJ3IMu1TvET8h
 AirgLdzEvKsHGMcPbw2xNx9igxBHYzYtWV6SXrk4L3TaIMY8Pel3AQkn5RIYxHiTyEMxJLYzB
 jNEloVdOOGFo+MiWohRORGjh7gHbPJ+bHD+g5g7qlTfhFcnRjS6R2XkTaAcynKWTPeLabDXnW
 urQOhtPZVhbahvqirZlCj/BIHvbEbPHMFLMTrvwmyDZUeESTnRBSgH6kQC17y2wjstUA1gC3s
 w3IbpQWv6XpvDmywjy6S3Tf3ayYf3rhTCCeceg0fBNimCOxvDxRlHs3Ozg3ROWN/53o1+9gCu
 BClseAmbWF6pEO0C7esKHjKuQ/6MerogBcBgeFgEME2Bxmm/2eXIXGr4hxVBtpYmJWZMxDpM7
 sfwZvWDx8S58fBdYrv0g2c+SpCFZW8C1iREWVwK7hcAj8JMIgP0MH38Tll9+1QIFuvcZuhMND
 Ko9IG3Zvkt/5l7sDq0xmg4nLNOPRtRMFtEPWbDWE+vxVO+F8Nx2CrNi9qCq7QJ5Pdozl4TABb
 cY0+A85OneAEd0ALnoceP6MK3hbaqYsc91bSwUpp3RsfZ/vgRZlIzW78984tkxApdD6p5rXPm
 iFGohdW3VTGlhn9Suyx8KBiq8Wtf4SxNkGVNxEBjHsMNslqbj8pfJsIMhZl4GUndkJ9s4Hyjz
 gzj8/dbcqV/aJejrdL40Cu1fKC7L1uckJ9Drvx+gn1jJWXHxXe7oTF3Eem6A0102rjFvy7f8y
 ORLa8zRKgZyZsUKzprwMNkT95N5SbLGbT5ox3qhgHT4K7+9p7sGQF+DbbQeh+HXudnBG42WCc
 g+01sZFC0=
Received-SPF: pass client-ip=212.227.15.3; envelope-from=arne_bab@HIDDEN;
 helo=mout.web.de
X-Spam_score_int: -27
X-Spam_score: -2.8
X-Spam_bar: --
X-Spam_report: (-2.8 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,
 DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001,
 RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001,
 RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001,
 SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no
X-Spam_action: no action
X-Spam-Score: 0.0 (/)
X-Debbugs-Envelope-To: submit
X-BeenThere: debbugs-submit <at> debbugs.gnu.org
X-Mailman-Version: 2.1.18
Precedence: list
List-Id: <debbugs-submit.debbugs.gnu.org>
List-Unsubscribe: <https://debbugs.gnu.org/cgi-bin/mailman/options/debbugs-submit>, 
 <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=unsubscribe>
List-Archive: <https://debbugs.gnu.org/cgi-bin/mailman/private/debbugs-submit/>
List-Post: <mailto:debbugs-submit <at> debbugs.gnu.org>
List-Help: <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=help>
List-Subscribe: <https://debbugs.gnu.org/cgi-bin/mailman/listinfo/debbugs-submit>, 
 <mailto:debbugs-submit-request <at> debbugs.gnu.org?subject=subscribe>
Errors-To: debbugs-submit-bounces <at> debbugs.gnu.org
Sender: "Debbugs-submit" <debbugs-submit-bounces <at> debbugs.gnu.org>
X-Spam-Score: -1.0 (-)

--=-=-=
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

The build of python-celery fails because test
TestBackendEcdsaCompatibility.test_public_key_to_pem[ECDSAECKey-Cryptograph=
yECKey] fails.

The reason seems to be that linebreaks are inserted at different places
than expected. End of the logfile
/var/log/guix/drvs/fx/d67zlmgm6mh90pdc4db8j22l47r15l-python-jose-3.3.0.drv.=
gz:

tests/test_utils.py::TestUtils::test_long_to_base64 PASSED               [1=
00%]

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D FAILURES =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
_ TestBackendEcdsaCompatibility.test_public_key_to_pem[ECDSAECKey-Cryptogra=
phyECKey] _

self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff54111e0>
BackendFrom =3D <class 'jose.backends.cryptography_backend.CryptographyECKe=
y'>
BackendTo =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>

    @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
    @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
    def test_public_key_to_pem(self, BackendFrom, BackendTo):
        key =3D BackendFrom(private_key, ALGORITHMS.ES256)
        key2 =3D BackendTo(private_key, ALGORITHMS.ES256)
=20=20=20=20
>       assert key.public_key().to_pem().strip() =3D=3D key2.public_key().t=
o_pem().strip()
E       AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj=
0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+=
DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D=
 b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ=
7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn=
Tm88Q=3D=3D\n-----END PUBLIC KEY-----'
E=20=20=20=20=20=20=20=20=20
E         At index 91 diff: b'\n' !=3D b't'
E=20=20=20=20=20=20=20=20=20
E         Full diff:
E           (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD=
QgAE7gb4edKJ7'
E         -  b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E         ?                                   --
E         +  b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E         ?                       ++
E            b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')

tests/algorithms/test_EC_compat.py:40: AssertionError
_ TestBackendEcdsaCompatibility.test_public_key_to_pem[CryptographyECKey-EC=
DSAECKey] _

self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5411c00>
BackendFrom =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>
BackendTo =3D <class 'jose.backends.cryptography_backend.CryptographyECKey'>

    @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
    @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
    def test_public_key_to_pem(self, BackendFrom, BackendTo):
        key =3D BackendFrom(private_key, ALGORITHMS.ES256)
        key2 =3D BackendTo(private_key, ALGORITHMS.ES256)
=20=20=20=20
>       assert key.public_key().to_pem().strip() =3D=3D key2.public_key().t=
o_pem().strip()
E       AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj=
0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+=
DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D=
 b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ=
7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn=
Tm88Q=3D=3D\n-----END PUBLIC KEY-----'
E=20=20=20=20=20=20=20=20=20
E         At index 91 diff: b't' !=3D b'\n'
E=20=20=20=20=20=20=20=20=20
E         Full diff:
E           (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD=
QgAE7gb4edKJ7'
E         -  b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E         ?                       --
E         +  b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E         ?                                   ++
E            b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')

tests/algorithms/test_EC_compat.py:40: AssertionError
_ TestBackendEcdsaCompatibility.test_private_key_to_pem[ECDSAECKey-Cryptogr=
aphyECKey] _

self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5410e20>
BackendFrom =3D <class 'jose.backends.cryptography_backend.CryptographyECKe=
y'>
BackendTo =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>

    @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
    @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
    def test_private_key_to_pem(self, BackendFrom, BackendTo):
        key =3D BackendFrom(private_key, ALGORITHMS.ES256)
        key2 =3D BackendTo(private_key, ALGORITHMS.ES256)
=20=20=20=20
>       assert key.to_pem().strip() =3D=3D key2.to_pem().strip()
E       AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO=
iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edK=
J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOK=
nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE =
KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49A=
wEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIOR=
lPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----'
E=20=20=20=20=20=20=20=20=20
E         At index 95 diff: b'\n' !=3D b'A'
E=20=20=20=20=20=20=20=20=20
E         Full diff:
E           (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR=
mzYybKdMlGniS'
E         -  b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E         ?                                       --
E         +  b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E         ?                           ++
E         -  b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E         ?                                            --
E         +  b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E         ?                    ++
E            b'E KEY-----')

tests/algorithms/test_EC_compat.py:48: AssertionError
_ TestBackendEcdsaCompatibility.test_private_key_to_pem[CryptographyECKey-E=
CDSAECKey] _

self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff54137f0>
BackendFrom =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>
BackendTo =3D <class 'jose.backends.cryptography_backend.CryptographyECKey'>

    @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
    @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
    def test_private_key_to_pem(self, BackendFrom, BackendTo):
        key =3D BackendFrom(private_key, ALGORITHMS.ES256)
        key2 =3D BackendTo(private_key, ALGORITHMS.ES256)
=20=20=20=20
>       assert key.to_pem().strip() =3D=3D key2.to_pem().strip()
E       AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO=
iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edK=
J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOK=
nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE =
KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\=
nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWI=
ORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----'
E=20=20=20=20=20=20=20=20=20
E         At index 95 diff: b'A' !=3D b'\n'
E=20=20=20=20=20=20=20=20=20
E         Full diff:
E           (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR=
mzYybKdMlGniS'
E         -  b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E         ?                           --
E         +  b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E         ?                                       ++
E         -  b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E         ?                    --
E         +  b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E         ?                                            ++
E            b'E KEY-----')

tests/algorithms/test_EC_compat.py:48: AssertionError
_ TestBackendEcdsaCompatibility.test_public_key_load_cycle[ECDSAECKey-Crypt=
ographyECKey] _

self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5411b10>
BackendFrom =3D <class 'jose.backends.cryptography_backend.CryptographyECKe=
y'>
BackendTo =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>

    @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
    @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
    def test_public_key_load_cycle(self, BackendFrom, BackendTo):
        key =3D BackendFrom(private_key, ALGORITHMS.ES256)
        pubkey =3D key.public_key()
=20=20=20=20
        pub_pem_source =3D pubkey.to_pem().strip()
=20=20=20=20
        pub_target =3D BackendTo(pub_pem_source, ALGORITHMS.ES256)
=20=20=20=20
>       assert pub_pem_source =3D=3D pub_target.to_pem().strip()
E       AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj=
0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+=
DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D=
 b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ=
7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn=
Tm88Q=3D=3D\n-----END PUBLIC KEY-----'
E=20=20=20=20=20=20=20=20=20
E         At index 91 diff: b'\n' !=3D b't'
E=20=20=20=20=20=20=20=20=20
E         Full diff:
E           (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD=
QgAE7gb4edKJ7'
E         -  b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E         ?                                   --
E         +  b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E         ?                       ++
E            b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')

tests/algorithms/test_EC_compat.py:60: AssertionError
_ TestBackendEcdsaCompatibility.test_public_key_load_cycle[CryptographyECKe=
y-ECDSAECKey] _

self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5410c70>
BackendFrom =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>
BackendTo =3D <class 'jose.backends.cryptography_backend.CryptographyECKey'>

    @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
    @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
    def test_public_key_load_cycle(self, BackendFrom, BackendTo):
        key =3D BackendFrom(private_key, ALGORITHMS.ES256)
        pubkey =3D key.public_key()
=20=20=20=20
        pub_pem_source =3D pubkey.to_pem().strip()
=20=20=20=20
        pub_target =3D BackendTo(pub_pem_source, ALGORITHMS.ES256)
=20=20=20=20
>       assert pub_pem_source =3D=3D pub_target.to_pem().strip()
E       AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj=
0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+=
DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D=
 b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ=
7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn=
Tm88Q=3D=3D\n-----END PUBLIC KEY-----'
E=20=20=20=20=20=20=20=20=20
E         At index 91 diff: b't' !=3D b'\n'
E=20=20=20=20=20=20=20=20=20
E         Full diff:
E           (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD=
QgAE7gb4edKJ7'
E         -  b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E         ?                       --
E         +  b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX=
ME+DRh6G/yVOK'
E         ?                                   ++
E            b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')

tests/algorithms/test_EC_compat.py:60: AssertionError
_ TestBackendEcdsaCompatibility.test_private_key_load_cycle[ECDSAECKey-Cryp=
tographyECKey] _

self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5411f00>
BackendFrom =3D <class 'jose.backends.cryptography_backend.CryptographyECKe=
y'>
BackendTo =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>

    @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
    @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
    def test_private_key_load_cycle(self, BackendFrom, BackendTo):
        key =3D BackendFrom(private_key, ALGORITHMS.ES256)
=20=20=20=20
        pem_source =3D key.to_pem().strip()
=20=20=20=20
        target =3D BackendTo(pem_source, ALGORITHMS.ES256)
=20=20=20=20
>       assert pem_source =3D=3D target.to_pem().strip()
E       AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO=
iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edK=
J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOK=
nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE =
KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49A=
wEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIOR=
lPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----'
E=20=20=20=20=20=20=20=20=20
E         At index 95 diff: b'\n' !=3D b'A'
E=20=20=20=20=20=20=20=20=20
E         Full diff:
E           (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR=
mzYybKdMlGniS'
E         -  b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E         ?                                       --
E         +  b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E         ?                           ++
E         -  b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E         ?                                            --
E         +  b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E         ?                    ++
E            b'E KEY-----')

tests/algorithms/test_EC_compat.py:71: AssertionError
_ TestBackendEcdsaCompatibility.test_private_key_load_cycle[CryptographyECK=
ey-ECDSAECKey] _

self =3D <tests.algorithms.test_EC_compat.TestBackendEcdsaCompatibility obj=
ect at 0x7ffff5412d40>
BackendFrom =3D <class 'jose.backends.ecdsa_backend.ECDSAECKey'>
BackendTo =3D <class 'jose.backends.cryptography_backend.CryptographyECKey'>

    @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey])
    @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey])
    def test_private_key_load_cycle(self, BackendFrom, BackendTo):
        key =3D BackendFrom(private_key, ALGORITHMS.ES256)
=20=20=20=20
        pem_source =3D key.to_pem().strip()
=20=20=20=20
        target =3D BackendTo(pem_source, ALGORITHMS.ES256)
=20=20=20=20
>       assert pem_source =3D=3D target.to_pem().strip()
E       AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO=
iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edK=
J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOK=
nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE =
KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\=
nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWI=
ORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----'
E=20=20=20=20=20=20=20=20=20
E         At index 95 diff: b'A' !=3D b'\n'
E=20=20=20=20=20=20=20=20=20
E         Full diff:
E           (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR=
mzYybKdMlGniS'
E         -  b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E         ?                           --
E         +  b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ=
TZ8qktqtBfRKb'
E         ?                                       ++
E         -  b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E         ?                    --
E         +  b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n=
-----END EC PRIVAT'
E         ?                                            ++
E            b'E KEY-----')

tests/algorithms/test_EC_compat.py:71: AssertionError
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D short test summary info =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_public_key_to_pem[ECDSAECKey-CryptographyECKey] - AssertionError: asser=
t b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edK=
J7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOK=
nTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-----=
\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKbo=
a71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC =
KEY-----'
=20=20
  At index 91 diff: b'\n' !=3D b't'
=20=20
  Full diff:
    (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4=
edKJ7'
  -  b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
  ?                                   --
  +  b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
  ?                       ++
     b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_public_key_to_pem[CryptographyECKey-ECDSAECKey] - AssertionError: asser=
t b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edK=
J7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOK=
nTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-----=
\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRK=
boa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC =
KEY-----'
=20=20
  At index 91 diff: b't' !=3D b'\n'
=20=20
  Full diff:
    (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4=
edKJ7'
  -  b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
  ?                       --
  +  b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
  ?                                   ++
     b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_private_key_to_pem[ECDSAECKey-CryptographyECKey] - AssertionError: asse=
rt b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlG=
niSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRK=
boa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END EC PR=
IVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnB=
lfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9Igo=
mCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=
=3D=3D\n-----END EC PRIVATE KEY-----'
=20=20
  At index 95 diff: b'\n' !=3D b'A'
=20=20
  Full diff:
    (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM=
lGniS'
  -  b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
  ?                                       --
  +  b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
  ?                           ++
  -  b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END=
 EC PRIVAT'
  ?                                            --
  +  b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END=
 EC PRIVAT'
  ?                    ++
     b'E KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_private_key_to_pem[CryptographyECKey-ECDSAECKey] - AssertionError: asse=
rt b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlG=
niSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRK=
boa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END EC PR=
IVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnB=
lfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9Igo=
mCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=
=3D=3D\n-----END EC PRIVATE KEY-----'
=20=20
  At index 95 diff: b'A' !=3D b'\n'
=20=20
  Full diff:
    (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM=
lGniS'
  -  b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
  ?                           --
  +  b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
  ?                                       ++
  -  b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END=
 EC PRIVAT'
  ?                    --
  +  b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END=
 EC PRIVAT'
  ?                                            ++
     b'E KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_public_key_load_cycle[ECDSAECKey-CryptographyECKey] - AssertionError: a=
ssert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb=
4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/=
yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-=
----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBf=
RKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUB=
LIC KEY-----'
=20=20
  At index 91 diff: b'\n' !=3D b't'
=20=20
  Full diff:
    (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4=
edKJ7'
  -  b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
  ?                                   --
  +  b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
  ?                       ++
     b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_public_key_load_cycle[CryptographyECKey-ECDSAECKey] - AssertionError: a=
ssert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb=
4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/=
yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-=
----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqt=
BfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUB=
LIC KEY-----'
=20=20
  At index 91 diff: b't' !=3D b'\n'
=20=20
  Full diff:
    (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4=
edKJ7'
  -  b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
  ?                       --
  +  b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G=
/yVOK'
  ?                                   ++
     b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_private_key_load_cycle[ECDSAECKey-CryptographyECKey] - AssertionError: =
assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybK=
dMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END E=
C PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs1=
0XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul=
9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm8=
8Q=3D=3D\n-----END EC PRIVATE KEY-----'
=20=20
  At index 95 diff: b'\n' !=3D b'A'
=20=20
  Full diff:
    (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM=
lGniS'
  -  b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
  ?                                       --
  +  b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
  ?                           ++
  -  b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END=
 EC PRIVAT'
  ?                                            --
  +  b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END=
 EC PRIVAT'
  ?                    ++
     b'E KEY-----')
FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t=
est_private_key_load_cycle[CryptographyECKey-ECDSAECKey] - AssertionError: =
assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybK=
dMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END E=
C PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs1=
0XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul=
9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm8=
8Q=3D=3D\n-----END EC PRIVATE KEY-----'
=20=20
  At index 95 diff: b'A' !=3D b'\n'
=20=20
  Full diff:
    (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM=
lGniS'
  -  b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
  ?                           --
  +  b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt=
BfRKb'
  ?                                       ++
  -  b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END=
 EC PRIVAT'
  ?                    --
  +  b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END=
 EC PRIVAT'
  ?                                            ++
     b'E KEY-----')
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D 8 failed, 447 passed=
, 12 skipped in 16.14s =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D
error: in phase 'check': uncaught exception:
%exception #<&invoke-error program: "pytest" arguments: ("-vv") exit-status=
: 1 term-signal: #f stop-signal: #f>=20
phase `check' failed after 16.4 seconds
command "pytest" "-vv" failed with status 1
build process 18 exited with status 256


Best wishes,
Arne
=2D-=20
Unpolitisch sein
hei=C3=9Ft politisch sein,
ohne es zu merken.
draketo.de

--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=SKhY
-----END PGP SIGNATURE-----
--=-=-=--




Acknowledgement sent to "Dr. Arne Babenhauserheide" <arne_bab@HIDDEN>:
New bug report received and forwarded. Copy sent to bug-guix@HIDDEN. Full text available.
Report forwarded to bug-guix@HIDDEN:
bug#75419; Package guix. Full text available.
Please note: This is a static page, with minimal formatting, updated once a day.
Click here to see this page with the latest information and nicer formatting.
Last modified: Sun, 12 Jan 2025 05:45:02 UTC

GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997 nCipher Corporation Ltd, 1994-97 Ian Jackson.