sbuild (Debian sbuild) 0.89.3+deb13u1 (16 August 2025) on +==============================================================================+ | ruby-jwt 3.1.2-1+rebuild1766590433 (amd64) Wed, 24 Dec 2025 15:33:54 +0000 | +==============================================================================+ Package: ruby-jwt Version: 3.1.2-1+rebuild1766590433 Source Version: 3.1.2-1+rebuild1766590433 Distribution: unstable Machine Architecture: amd64 Host Architecture: amd64 Build Architecture: amd64 Build Type: binary I: No tarballs found in /home/admin/.cache/sbuild I: Creating chroot on-demand by running: mmdebstrap --variant=buildd --arch=amd64 --skip=output/mknod --format=tar unstable - I: Unpacking tarball from STDIN to /tmp/tmp.sbuild.WaZl9P9_Oh... I: automatically chosen mode: unshare I: chroot architecture amd64 is equal to the host's architecture I: finding correct signed-by value... I: using /tmp/mmdebstrap.h2bBVOmPyp as tempdir I: skipping output/mknod as requested for ./dev/console I: skipping output/mknod as requested for ./dev/full I: skipping output/mknod as requested for ./dev/null I: skipping output/mknod as requested for ./dev/ptmx I: skipping output/mknod as requested for ./dev/random I: skipping output/mknod as requested for ./dev/tty I: skipping output/mknod as requested for ./dev/urandom I: skipping output/mknod as requested for ./dev/zero I: running apt-get update... I: downloading packages with apt... I: extracting archives... I: installing essential packages... I: installing remaining packages inside the chroot... I: cleaning package lists and apt cache... I: creating tarball... I: done I: removing tempdir /tmp/mmdebstrap.h2bBVOmPyp... I: success in 12.2095 seconds I: The chroot directory at /tmp/tmp.sbuild.WaZl9P9_Oh will be removed at the end of the build I: To avoid creating a new chroot from scratch every time, either: I: - place a chroot tarball at /home/admin/.cache/sbuild/unstable-amd64.tar and update it manually, for example by running: mmdebstrap --variant=buildd --arch=amd64 --skip=output/mknod --format=tar unstable /home/admin/.cache/sbuild/unstable-amd64.tar I: - or let sbuild take care of this via the setting UNSHARE_MMDEBSTRAP_KEEP_TARBALL by adding '$unshare_mmdebstrap_keep_tarball = 1;' to your ~/.config/sbuild/config.pl. I: - or completely disable this behaviour via the setting UNSHARE_MMDEBSTRAP_AUTO_CREATE by adding '$unshare_mmdebstrap_auto_create = 0;' to your ~/.config/sbuild/config.pl. I: Refer to UNSHARE_MMDEBSTRAP_KEEP_TARBALL in sbuild.conf(5) for more information I: Setting up the chroot... I: Creating chroot session... I: Setting up log color... I: Setting up apt archive... +------------------------------------------------------------------------------+ | Update chroot Wed, 24 Dec 2025 15:34:09 +0000 | +------------------------------------------------------------------------------+ Ign:1 file:/mass-rebuild ./ InRelease Get:2 file:/mass-rebuild ./ Release [1617 B] Get:2 file:/mass-rebuild ./ Release [1617 B] Ign:3 file:/mass-rebuild ./ Release.gpg Get:4 file:/mass-rebuild ./ Packages [70.4 kB] Get:5 http://deb.debian.org/debian unstable InRelease [187 kB] Get:6 http://deb.debian.org/debian experimental InRelease [90.7 kB] Get:7 http://deb.debian.org/debian unstable/main amd64 Packages [10.2 MB] Get:8 http://deb.debian.org/debian experimental/main amd64 Packages [432 kB] Get:9 http://incoming.debian.org/debian-buildd buildd-unstable InRelease [48.9 kB] Get:10 http://incoming.debian.org/debian-buildd buildd-unstable/main amd64 Packages [83.3 kB] Fetched 11.1 MB in 2s (5990 kB/s) Reading package lists... Reading package lists... Building dependency tree... Reading state information... Calculating upgrade... The following packages will be upgraded: libselinux1 1 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Need to get 0 B/85.8 kB of archives. After this operation, 1024 B disk space will be freed. Get:1 file:/mass-rebuild ./ libselinux1 3.9-4+rebuild1766544377 [85.8 kB] (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 11800 files and directories currently installed.) Preparing to unpack .../libselinux1_3.9-4+rebuild1766544377_amd64.deb ... Unpacking libselinux1:amd64 (3.9-4+rebuild1766544377) over (3.9-4+b1) ... Setting up libselinux1:amd64 (3.9-4+rebuild1766544377) ... Processing triggers for libc-bin (2.42-6) ... +------------------------------------------------------------------------------+ | Fetch source files Wed, 24 Dec 2025 15:34:13 +0000 | +------------------------------------------------------------------------------+ Local sources ------------- /home/admin/mass-rebuild/builds/3/ruby-jwt/ruby-jwt_3.1.2-1+rebuild1766590433.dsc exists in /home/admin/mass-rebuild/builds/3/ruby-jwt; copying to chroot +------------------------------------------------------------------------------+ | Install package build dependencies Wed, 24 Dec 2025 15:34:14 +0000 | +------------------------------------------------------------------------------+ Setup apt archive ----------------- Merged Build-Depends: debhelper-compat (= 13), gem2deb (>= 1), rake, ruby-rspec, ruby-rbnacl, ruby-simplecov, build-essential Filtered Build-Depends: debhelper-compat (= 13), gem2deb (>= 1), rake, ruby-rspec, ruby-rbnacl, ruby-simplecov, build-essential dpkg-deb: building package 'sbuild-build-depends-main-dummy' in '/build/reproducible-path/resolver-qRSzvB/apt_archive/sbuild-build-depends-main-dummy.deb'. Ign:1 copy:/build/reproducible-path/resolver-qRSzvB/apt_archive ./ InRelease Get:2 copy:/build/reproducible-path/resolver-qRSzvB/apt_archive ./ Release [609 B] Ign:3 copy:/build/reproducible-path/resolver-qRSzvB/apt_archive ./ Release.gpg Get:4 copy:/build/reproducible-path/resolver-qRSzvB/apt_archive ./ Sources [663 B] Get:5 copy:/build/reproducible-path/resolver-qRSzvB/apt_archive ./ Packages [702 B] Fetched 1974 B in 0s (0 B/s) Reading package lists... Ign:1 file:/mass-rebuild ./ InRelease Get:2 file:/mass-rebuild ./ Release [1617 B] Get:2 file:/mass-rebuild ./ Release [1617 B] Ign:3 file:/mass-rebuild ./ Release.gpg Hit:4 http://deb.debian.org/debian experimental InRelease Hit:5 http://incoming.debian.org/debian-buildd buildd-unstable InRelease Reading package lists... Reading package lists... Install main build dependencies (apt-based resolver) ---------------------------------------------------- Installing build dependencies Reading package lists... Building dependency tree... Reading state information... Solving dependencies... The following additional packages will be installed: autoconf automake autopoint autotools-dev bsdextrautils ca-certificates debhelper dh-autoreconf dh-strip-nondeterminism dwz file gem2deb gem2deb-test-runner gettext gettext-base groff-base intltool-debian libarchive-zip-perl libdebhelper-perl libelf1t64 libffi8 libfile-stripnondeterminism-perl libgmp-dev libgmpxx4ldbl libjs-jquery libjs-jquery-easing libjs-jquery-fancybox libjs-jquery-mousewheel libjs-jquery-ui libmagic-mgc libmagic1t64 libpipeline1 libruby libruby3.3 libsodium23 libtool libuchardet0 libunistring5 libxml2-16 libyaml-0-2 m4 man-db openssl po-debconf rake ruby ruby-all-dev ruby-csv ruby-did-you-mean ruby-diff-lcs ruby-docile ruby-ffi ruby-minitest ruby-net-telnet ruby-power-assert ruby-rbnacl ruby-rspec ruby-rspec-core ruby-rspec-expectations ruby-rspec-mocks ruby-rspec-support ruby-ruby2-keywords ruby-rubygems ruby-simplecov ruby-simplecov-html ruby-test-unit ruby-webrick ruby-xmlrpc ruby3.3 ruby3.3-dev rubygems-integration sensible-utils Suggested packages: autoconf-archive gnu-standards autoconf-doc dh-make git-buildpackage pristine-tar gettext-doc libasprintf-dev libgettextpo-dev gnulib-l10n groff gmp-doc libgmp10-doc libmpfr-dev libjs-jquery-ui-docs libtool-doc gfortran | fortran95-compiler m4-doc apparmor less www-browser libmail-box-perl ri ruby-dev bundler Recommended packages: apt-file debian-policy devscripts python3-debian curl | wget | lynx libarchive-cpio-perl javascript-common ruby-sdbm libltdl-dev libmail-sendmail-perl zip fonts-lato ruby3.3-doc The following NEW packages will be installed: autoconf automake autopoint autotools-dev bsdextrautils ca-certificates debhelper dh-autoreconf dh-strip-nondeterminism dwz file gem2deb gem2deb-test-runner gettext gettext-base groff-base intltool-debian libarchive-zip-perl libdebhelper-perl libelf1t64 libffi8 libfile-stripnondeterminism-perl libgmp-dev libgmpxx4ldbl libjs-jquery libjs-jquery-easing libjs-jquery-fancybox libjs-jquery-mousewheel libjs-jquery-ui libmagic-mgc libmagic1t64 libpipeline1 libruby libruby3.3 libsodium23 libtool libuchardet0 libunistring5 libxml2-16 libyaml-0-2 m4 man-db openssl po-debconf rake ruby ruby-all-dev ruby-csv ruby-did-you-mean ruby-diff-lcs ruby-docile ruby-ffi ruby-minitest ruby-net-telnet ruby-power-assert ruby-rbnacl ruby-rspec ruby-rspec-core ruby-rspec-expectations ruby-rspec-mocks ruby-rspec-support ruby-ruby2-keywords ruby-rubygems ruby-simplecov ruby-simplecov-html ruby-test-unit ruby-webrick ruby-xmlrpc ruby3.3 ruby3.3-dev rubygems-integration sbuild-build-depends-main-dummy sensible-utils 0 upgraded, 73 newly installed, 0 to remove and 0 not upgraded. Need to get 24.8 MB/24.9 MB of archives. After this operation, 96.0 MB of additional disk space will be used. Get:1 file:/mass-rebuild ./ ruby-ffi 1.17.2+dfsg-1+rebuild1766547583 [125 kB] Get:2 copy:/build/reproducible-path/resolver-qRSzvB/apt_archive ./ sbuild-build-depends-main-dummy 0.invalid.0 [892 B] Get:3 http://deb.debian.org/debian unstable/main amd64 sensible-utils all 0.0.26 [27.0 kB] Get:4 http://deb.debian.org/debian unstable/main amd64 openssl amd64 3.5.4-1 [1496 kB] Get:5 http://deb.debian.org/debian unstable/main amd64 ca-certificates all 20250419 [162 kB] Get:6 http://deb.debian.org/debian unstable/main amd64 libmagic-mgc amd64 1:5.46-5 [338 kB] Get:7 http://deb.debian.org/debian unstable/main amd64 libmagic1t64 amd64 1:5.46-5 [109 kB] Get:8 http://deb.debian.org/debian unstable/main amd64 file amd64 1:5.46-5 [43.6 kB] Get:9 http://deb.debian.org/debian unstable/main amd64 gettext-base amd64 0.23.2-1 [245 kB] Get:10 http://deb.debian.org/debian unstable/main amd64 libuchardet0 amd64 0.0.8-2 [68.5 kB] Get:11 http://deb.debian.org/debian unstable/main amd64 groff-base amd64 1.23.0-10 [1194 kB] Get:12 http://deb.debian.org/debian unstable/main amd64 bsdextrautils amd64 2.41.3-2 [98.9 kB] Get:13 http://deb.debian.org/debian unstable/main amd64 libpipeline1 amd64 1.5.8-2 [42.1 kB] Get:14 http://deb.debian.org/debian unstable/main amd64 man-db amd64 2.13.1-1 [1469 kB] Get:15 http://deb.debian.org/debian unstable/main amd64 m4 amd64 1.4.20-2 [325 kB] Get:16 http://deb.debian.org/debian unstable/main amd64 autoconf all 2.72-3.1 [494 kB] Get:17 http://deb.debian.org/debian unstable/main amd64 autotools-dev all 20240727.1 [60.2 kB] Get:18 http://deb.debian.org/debian unstable/main amd64 automake all 1:1.18.1-3 [878 kB] Get:19 http://deb.debian.org/debian unstable/main amd64 autopoint all 0.23.2-1 [772 kB] Get:20 http://deb.debian.org/debian unstable/main amd64 libdebhelper-perl all 13.29 [92.6 kB] Get:21 http://deb.debian.org/debian unstable/main amd64 libtool all 2.5.4-9 [540 kB] Get:22 http://deb.debian.org/debian unstable/main amd64 dh-autoreconf all 21 [12.2 kB] Get:23 http://deb.debian.org/debian unstable/main amd64 libarchive-zip-perl all 1.68-1 [104 kB] Get:24 http://deb.debian.org/debian unstable/main amd64 libfile-stripnondeterminism-perl all 1.15.0-1 [19.9 kB] Get:25 http://deb.debian.org/debian unstable/main amd64 dh-strip-nondeterminism all 1.15.0-1 [8812 B] Get:26 http://deb.debian.org/debian unstable/main amd64 libelf1t64 amd64 0.194-1 [185 kB] Get:27 http://deb.debian.org/debian unstable/main amd64 dwz amd64 0.16-2 [108 kB] Get:28 http://deb.debian.org/debian unstable/main amd64 libunistring5 amd64 1.3-2 [477 kB] Get:29 http://deb.debian.org/debian unstable/main amd64 libxml2-16 amd64 2.15.1+dfsg-2+b1 [641 kB] Get:30 http://deb.debian.org/debian unstable/main amd64 gettext amd64 0.23.2-1 [1687 kB] Get:31 http://deb.debian.org/debian unstable/main amd64 intltool-debian all 0.35.0+20060710.6 [22.9 kB] Get:32 http://deb.debian.org/debian unstable/main amd64 po-debconf all 1.0.22 [216 kB] Get:33 http://deb.debian.org/debian unstable/main amd64 debhelper all 13.29 [943 kB] Get:34 http://deb.debian.org/debian unstable/main amd64 rubygems-integration all 1.19 [5488 B] Get:35 http://deb.debian.org/debian unstable/main amd64 ruby-csv all 3.3.4-1 [42.2 kB] Get:36 http://deb.debian.org/debian unstable/main amd64 ruby-did-you-mean all 1.6.3-2 [20.9 kB] Get:37 http://deb.debian.org/debian unstable/main amd64 ruby-net-telnet all 0.2.0-1 [13.1 kB] Get:38 http://deb.debian.org/debian unstable/main amd64 ruby-ruby2-keywords all 0.0.5-1 [4300 B] Get:39 http://deb.debian.org/debian unstable/main amd64 ruby-webrick all 1.9.1-1 [59.6 kB] Get:40 http://deb.debian.org/debian unstable/main amd64 ruby-xmlrpc all 0.3.3-2 [24.4 kB] Get:41 http://deb.debian.org/debian unstable/main amd64 libffi8 amd64 3.5.2-3 [26.1 kB] Get:42 http://deb.debian.org/debian unstable/main amd64 libyaml-0-2 amd64 0.2.5-2+b1 [53.8 kB] Get:43 http://deb.debian.org/debian unstable/main amd64 libruby3.3 amd64 3.3.8-2 [6301 kB] Get:44 http://deb.debian.org/debian unstable/main amd64 ruby3.3 amd64 3.3.8-2 [834 kB] Get:45 http://deb.debian.org/debian unstable/main amd64 libruby amd64 1:3.3+b1 [5440 B] Get:46 http://deb.debian.org/debian unstable/main amd64 ruby-rubygems all 3.6.7-2 [407 kB] Get:47 http://deb.debian.org/debian unstable/main amd64 ruby amd64 1:3.3+b1 [6560 B] Get:48 http://deb.debian.org/debian unstable/main amd64 rake all 13.2.1-1 [65.2 kB] Get:49 http://deb.debian.org/debian unstable/main amd64 ruby-minitest all 5.26.1-1 [67.3 kB] Get:50 http://deb.debian.org/debian unstable/main amd64 ruby-power-assert all 2.0.5-1 [11.7 kB] Get:51 http://deb.debian.org/debian unstable/main amd64 ruby-test-unit all 3.6.2-1 [79.1 kB] Get:52 http://deb.debian.org/debian unstable/main amd64 gem2deb-test-runner amd64 2.2.6 [18.4 kB] Get:53 http://deb.debian.org/debian unstable/main amd64 libgmpxx4ldbl amd64 2:6.3.0+dfsg-5 [330 kB] Get:54 http://deb.debian.org/debian unstable/main amd64 libgmp-dev amd64 2:6.3.0+dfsg-5 [658 kB] Get:55 http://deb.debian.org/debian unstable/main amd64 ruby3.3-dev amd64 3.3.8-2 [1045 kB] Get:56 http://deb.debian.org/debian unstable/main amd64 ruby-all-dev amd64 1:3.3+b1 [6496 B] Get:57 http://deb.debian.org/debian unstable/main amd64 gem2deb amd64 2.2.6 [48.3 kB] Get:58 http://deb.debian.org/debian unstable/main amd64 libjs-jquery all 3.7.1+dfsg+~3.5.33-1 [319 kB] Get:59 http://deb.debian.org/debian unstable/main amd64 libjs-jquery-easing all 12-4 [6888 B] Get:60 http://deb.debian.org/debian unstable/main amd64 libjs-jquery-mousewheel all 1:3.1.13-5 [7792 B] Get:61 http://deb.debian.org/debian unstable/main amd64 libjs-jquery-fancybox all 12-4 [50.5 kB] Get:62 http://deb.debian.org/debian unstable/main amd64 libjs-jquery-ui all 1.13.2+dfsg-1 [250 kB] Get:63 http://deb.debian.org/debian unstable/main amd64 libsodium23 amd64 1.0.18-1+b2 [165 kB] Get:64 http://deb.debian.org/debian unstable/main amd64 ruby-diff-lcs all 1.6.2-1 [29.8 kB] Get:65 http://deb.debian.org/debian unstable/main amd64 ruby-docile all 1.1.5-3 [6884 B] Get:66 http://deb.debian.org/debian unstable/main amd64 ruby-rbnacl all 7.1.1-1 [35.9 kB] Get:67 http://deb.debian.org/debian unstable/main amd64 ruby-rspec-support all 3.13.0c0e0m0s1-2 [28.5 kB] Get:68 http://deb.debian.org/debian unstable/main amd64 ruby-rspec-core all 3.13.0c0e0m0s1-2 [164 kB] Get:69 http://deb.debian.org/debian unstable/main amd64 ruby-rspec-expectations all 3.13.0c0e0m0s1-2 [90.2 kB] Get:70 http://deb.debian.org/debian unstable/main amd64 ruby-rspec-mocks all 3.13.0c0e0m0s1-2 [81.3 kB] Get:71 http://deb.debian.org/debian unstable/main amd64 ruby-rspec all 3.13.0c0e0m0s1-2 [5184 B] Get:72 http://deb.debian.org/debian unstable/main amd64 ruby-simplecov-html all 0.12.3-2 [468 kB] Get:73 http://deb.debian.org/debian unstable/main amd64 ruby-simplecov all 0.22.0-2 [45.2 kB] Preconfiguring packages ... Fetched 24.8 MB in 0s (95.5 MB/s) Selecting previously unselected package sensible-utils. (Reading database ... 11799 files and directories currently installed.) Preparing to unpack .../00-sensible-utils_0.0.26_all.deb ... Unpacking sensible-utils (0.0.26) ... Selecting previously unselected package openssl. Preparing to unpack .../01-openssl_3.5.4-1_amd64.deb ... Unpacking openssl (3.5.4-1) ... Selecting previously unselected package ca-certificates. Preparing to unpack .../02-ca-certificates_20250419_all.deb ... Unpacking ca-certificates (20250419) ... Selecting previously unselected package libmagic-mgc. Preparing to unpack .../03-libmagic-mgc_1%3a5.46-5_amd64.deb ... Unpacking libmagic-mgc (1:5.46-5) ... Selecting previously unselected package libmagic1t64:amd64. Preparing to unpack .../04-libmagic1t64_1%3a5.46-5_amd64.deb ... Unpacking libmagic1t64:amd64 (1:5.46-5) ... Selecting previously unselected package file. Preparing to unpack .../05-file_1%3a5.46-5_amd64.deb ... Unpacking file (1:5.46-5) ... Selecting previously unselected package gettext-base. Preparing to unpack .../06-gettext-base_0.23.2-1_amd64.deb ... Unpacking gettext-base (0.23.2-1) ... Selecting previously unselected package libuchardet0:amd64. Preparing to unpack .../07-libuchardet0_0.0.8-2_amd64.deb ... Unpacking libuchardet0:amd64 (0.0.8-2) ... Selecting previously unselected package groff-base. Preparing to unpack .../08-groff-base_1.23.0-10_amd64.deb ... Unpacking groff-base (1.23.0-10) ... Selecting previously unselected package bsdextrautils. Preparing to unpack .../09-bsdextrautils_2.41.3-2_amd64.deb ... Unpacking bsdextrautils (2.41.3-2) ... Selecting previously unselected package libpipeline1:amd64. Preparing to unpack .../10-libpipeline1_1.5.8-2_amd64.deb ... Unpacking libpipeline1:amd64 (1.5.8-2) ... Selecting previously unselected package man-db. Preparing to unpack .../11-man-db_2.13.1-1_amd64.deb ... Unpacking man-db (2.13.1-1) ... Selecting previously unselected package m4. Preparing to unpack .../12-m4_1.4.20-2_amd64.deb ... Unpacking m4 (1.4.20-2) ... Selecting previously unselected package autoconf. Preparing to unpack .../13-autoconf_2.72-3.1_all.deb ... Unpacking autoconf (2.72-3.1) ... Selecting previously unselected package autotools-dev. Preparing to unpack .../14-autotools-dev_20240727.1_all.deb ... Unpacking autotools-dev (20240727.1) ... Selecting previously unselected package automake. Preparing to unpack .../15-automake_1%3a1.18.1-3_all.deb ... Unpacking automake (1:1.18.1-3) ... Selecting previously unselected package autopoint. Preparing to unpack .../16-autopoint_0.23.2-1_all.deb ... Unpacking autopoint (0.23.2-1) ... Selecting previously unselected package libdebhelper-perl. Preparing to unpack .../17-libdebhelper-perl_13.29_all.deb ... Unpacking libdebhelper-perl (13.29) ... Selecting previously unselected package libtool. Preparing to unpack .../18-libtool_2.5.4-9_all.deb ... Unpacking libtool (2.5.4-9) ... Selecting previously unselected package dh-autoreconf. Preparing to unpack .../19-dh-autoreconf_21_all.deb ... Unpacking dh-autoreconf (21) ... Selecting previously unselected package libarchive-zip-perl. Preparing to unpack .../20-libarchive-zip-perl_1.68-1_all.deb ... Unpacking libarchive-zip-perl (1.68-1) ... Selecting previously unselected package libfile-stripnondeterminism-perl. Preparing to unpack .../21-libfile-stripnondeterminism-perl_1.15.0-1_all.deb ... Unpacking libfile-stripnondeterminism-perl (1.15.0-1) ... Selecting previously unselected package dh-strip-nondeterminism. Preparing to unpack .../22-dh-strip-nondeterminism_1.15.0-1_all.deb ... Unpacking dh-strip-nondeterminism (1.15.0-1) ... Selecting previously unselected package libelf1t64:amd64. Preparing to unpack .../23-libelf1t64_0.194-1_amd64.deb ... Unpacking libelf1t64:amd64 (0.194-1) ... Selecting previously unselected package dwz. Preparing to unpack .../24-dwz_0.16-2_amd64.deb ... Unpacking dwz (0.16-2) ... Selecting previously unselected package libunistring5:amd64. Preparing to unpack .../25-libunistring5_1.3-2_amd64.deb ... Unpacking libunistring5:amd64 (1.3-2) ... Selecting previously unselected package libxml2-16:amd64. Preparing to unpack .../26-libxml2-16_2.15.1+dfsg-2+b1_amd64.deb ... Unpacking libxml2-16:amd64 (2.15.1+dfsg-2+b1) ... Selecting previously unselected package gettext. Preparing to unpack .../27-gettext_0.23.2-1_amd64.deb ... Unpacking gettext (0.23.2-1) ... Selecting previously unselected package intltool-debian. Preparing to unpack .../28-intltool-debian_0.35.0+20060710.6_all.deb ... Unpacking intltool-debian (0.35.0+20060710.6) ... Selecting previously unselected package po-debconf. Preparing to unpack .../29-po-debconf_1.0.22_all.deb ... Unpacking po-debconf (1.0.22) ... Selecting previously unselected package debhelper. Preparing to unpack .../30-debhelper_13.29_all.deb ... Unpacking debhelper (13.29) ... Selecting previously unselected package rubygems-integration. Preparing to unpack .../31-rubygems-integration_1.19_all.deb ... Unpacking rubygems-integration (1.19) ... Selecting previously unselected package ruby-csv. Preparing to unpack .../32-ruby-csv_3.3.4-1_all.deb ... Unpacking ruby-csv (3.3.4-1) ... Selecting previously unselected package ruby-did-you-mean. Preparing to unpack .../33-ruby-did-you-mean_1.6.3-2_all.deb ... Unpacking ruby-did-you-mean (1.6.3-2) ... Selecting previously unselected package ruby-net-telnet. Preparing to unpack .../34-ruby-net-telnet_0.2.0-1_all.deb ... Unpacking ruby-net-telnet (0.2.0-1) ... Selecting previously unselected package ruby-ruby2-keywords. Preparing to unpack .../35-ruby-ruby2-keywords_0.0.5-1_all.deb ... Unpacking ruby-ruby2-keywords (0.0.5-1) ... Selecting previously unselected package ruby-webrick. Preparing to unpack .../36-ruby-webrick_1.9.1-1_all.deb ... Unpacking ruby-webrick (1.9.1-1) ... Selecting previously unselected package ruby-xmlrpc. Preparing to unpack .../37-ruby-xmlrpc_0.3.3-2_all.deb ... Unpacking ruby-xmlrpc (0.3.3-2) ... Selecting previously unselected package libffi8:amd64. Preparing to unpack .../38-libffi8_3.5.2-3_amd64.deb ... Unpacking libffi8:amd64 (3.5.2-3) ... Selecting previously unselected package libyaml-0-2:amd64. Preparing to unpack .../39-libyaml-0-2_0.2.5-2+b1_amd64.deb ... Unpacking libyaml-0-2:amd64 (0.2.5-2+b1) ... Selecting previously unselected package libruby3.3:amd64. Preparing to unpack .../40-libruby3.3_3.3.8-2_amd64.deb ... Unpacking libruby3.3:amd64 (3.3.8-2) ... Selecting previously unselected package ruby3.3. Preparing to unpack .../41-ruby3.3_3.3.8-2_amd64.deb ... Unpacking ruby3.3 (3.3.8-2) ... Selecting previously unselected package libruby:amd64. Preparing to unpack .../42-libruby_1%3a3.3+b1_amd64.deb ... Unpacking libruby:amd64 (1:3.3+b1) ... Selecting previously unselected package ruby-rubygems. Preparing to unpack .../43-ruby-rubygems_3.6.7-2_all.deb ... Unpacking ruby-rubygems (3.6.7-2) ... Selecting previously unselected package ruby. Preparing to unpack .../44-ruby_1%3a3.3+b1_amd64.deb ... Unpacking ruby (1:3.3+b1) ... Selecting previously unselected package rake. Preparing to unpack .../45-rake_13.2.1-1_all.deb ... Unpacking rake (13.2.1-1) ... Selecting previously unselected package ruby-minitest. Preparing to unpack .../46-ruby-minitest_5.26.1-1_all.deb ... Unpacking ruby-minitest (5.26.1-1) ... Selecting previously unselected package ruby-power-assert. Preparing to unpack .../47-ruby-power-assert_2.0.5-1_all.deb ... Unpacking ruby-power-assert (2.0.5-1) ... Selecting previously unselected package ruby-test-unit. Preparing to unpack .../48-ruby-test-unit_3.6.2-1_all.deb ... Unpacking ruby-test-unit (3.6.2-1) ... Selecting previously unselected package gem2deb-test-runner. Preparing to unpack .../49-gem2deb-test-runner_2.2.6_amd64.deb ... Unpacking gem2deb-test-runner (2.2.6) ... Selecting previously unselected package libgmpxx4ldbl:amd64. Preparing to unpack .../50-libgmpxx4ldbl_2%3a6.3.0+dfsg-5_amd64.deb ... Unpacking libgmpxx4ldbl:amd64 (2:6.3.0+dfsg-5) ... Selecting previously unselected package libgmp-dev:amd64. Preparing to unpack .../51-libgmp-dev_2%3a6.3.0+dfsg-5_amd64.deb ... Unpacking libgmp-dev:amd64 (2:6.3.0+dfsg-5) ... Selecting previously unselected package ruby3.3-dev:amd64. Preparing to unpack .../52-ruby3.3-dev_3.3.8-2_amd64.deb ... Unpacking ruby3.3-dev:amd64 (3.3.8-2) ... Selecting previously unselected package ruby-all-dev:amd64. Preparing to unpack .../53-ruby-all-dev_1%3a3.3+b1_amd64.deb ... Unpacking ruby-all-dev:amd64 (1:3.3+b1) ... Selecting previously unselected package gem2deb. Preparing to unpack .../54-gem2deb_2.2.6_amd64.deb ... Unpacking gem2deb (2.2.6) ... Selecting previously unselected package libjs-jquery. Preparing to unpack .../55-libjs-jquery_3.7.1+dfsg+~3.5.33-1_all.deb ... Unpacking libjs-jquery (3.7.1+dfsg+~3.5.33-1) ... Selecting previously unselected package libjs-jquery-easing. Preparing to unpack .../56-libjs-jquery-easing_12-4_all.deb ... Unpacking libjs-jquery-easing (12-4) ... Selecting previously unselected package libjs-jquery-mousewheel. Preparing to unpack .../57-libjs-jquery-mousewheel_1%3a3.1.13-5_all.deb ... Unpacking libjs-jquery-mousewheel (1:3.1.13-5) ... Selecting previously unselected package libjs-jquery-fancybox. Preparing to unpack .../58-libjs-jquery-fancybox_12-4_all.deb ... Unpacking libjs-jquery-fancybox (12-4) ... Selecting previously unselected package libjs-jquery-ui. Preparing to unpack .../59-libjs-jquery-ui_1.13.2+dfsg-1_all.deb ... Unpacking libjs-jquery-ui (1.13.2+dfsg-1) ... Selecting previously unselected package libsodium23:amd64. Preparing to unpack .../60-libsodium23_1.0.18-1+b2_amd64.deb ... Unpacking libsodium23:amd64 (1.0.18-1+b2) ... Selecting previously unselected package ruby-diff-lcs. Preparing to unpack .../61-ruby-diff-lcs_1.6.2-1_all.deb ... Unpacking ruby-diff-lcs (1.6.2-1) ... Selecting previously unselected package ruby-docile. Preparing to unpack .../62-ruby-docile_1.1.5-3_all.deb ... Unpacking ruby-docile (1.1.5-3) ... Selecting previously unselected package ruby-ffi:amd64. Preparing to unpack .../63-ruby-ffi_1.17.2+dfsg-1+rebuild1766547583_amd64.deb ... Unpacking ruby-ffi:amd64 (1.17.2+dfsg-1+rebuild1766547583) ... Selecting previously unselected package ruby-rbnacl. Preparing to unpack .../64-ruby-rbnacl_7.1.1-1_all.deb ... Unpacking ruby-rbnacl (7.1.1-1) ... Selecting previously unselected package ruby-rspec-support. Preparing to unpack .../65-ruby-rspec-support_3.13.0c0e0m0s1-2_all.deb ... Unpacking ruby-rspec-support (3.13.0c0e0m0s1-2) ... Selecting previously unselected package ruby-rspec-core. Preparing to unpack .../66-ruby-rspec-core_3.13.0c0e0m0s1-2_all.deb ... Unpacking ruby-rspec-core (3.13.0c0e0m0s1-2) ... Selecting previously unselected package ruby-rspec-expectations. Preparing to unpack .../67-ruby-rspec-expectations_3.13.0c0e0m0s1-2_all.deb ... Unpacking ruby-rspec-expectations (3.13.0c0e0m0s1-2) ... Selecting previously unselected package ruby-rspec-mocks. Preparing to unpack .../68-ruby-rspec-mocks_3.13.0c0e0m0s1-2_all.deb ... Unpacking ruby-rspec-mocks (3.13.0c0e0m0s1-2) ... Selecting previously unselected package ruby-rspec. Preparing to unpack .../69-ruby-rspec_3.13.0c0e0m0s1-2_all.deb ... Unpacking ruby-rspec (3.13.0c0e0m0s1-2) ... Selecting previously unselected package ruby-simplecov-html. Preparing to unpack .../70-ruby-simplecov-html_0.12.3-2_all.deb ... Unpacking ruby-simplecov-html (0.12.3-2) ... Selecting previously unselected package ruby-simplecov. Preparing to unpack .../71-ruby-simplecov_0.22.0-2_all.deb ... Unpacking ruby-simplecov (0.22.0-2) ... Selecting previously unselected package sbuild-build-depends-main-dummy. Preparing to unpack .../72-sbuild-build-depends-main-dummy_0.invalid.0_amd64.deb ... Unpacking sbuild-build-depends-main-dummy (0.invalid.0) ... Setting up libpipeline1:amd64 (1.5.8-2) ... Setting up ruby-ruby2-keywords (0.0.5-1) ... Setting up libsodium23:amd64 (1.0.18-1+b2) ... Setting up bsdextrautils (2.41.3-2) ... Setting up ruby-power-assert (2.0.5-1) ... Setting up libmagic-mgc (1:5.46-5) ... Setting up libarchive-zip-perl (1.68-1) ... Setting up libyaml-0-2:amd64 (0.2.5-2+b1) ... Setting up libxml2-16:amd64 (2.15.1+dfsg-2+b1) ... Setting up libdebhelper-perl (13.29) ... Setting up libmagic1t64:amd64 (1:5.46-5) ... Setting up libjs-jquery-mousewheel (1:3.1.13-5) ... Setting up gettext-base (0.23.2-1) ... Setting up m4 (1.4.20-2) ... Setting up file (1:5.46-5) ... Setting up libelf1t64:amd64 (0.194-1) ... Setting up ruby-minitest (5.26.1-1) ... Setting up autotools-dev (20240727.1) ... Setting up libgmpxx4ldbl:amd64 (2:6.3.0+dfsg-5) ... Setting up ruby-test-unit (3.6.2-1) ... Setting up ruby-net-telnet (0.2.0-1) ... Setting up ruby-csv (3.3.4-1) ... Setting up libunistring5:amd64 (1.3-2) ... Setting up autopoint (0.23.2-1) ... Setting up autoconf (2.72-3.1) ... Setting up ruby-rspec-support (3.13.0c0e0m0s1-2) ... Setting up ruby-webrick (1.9.1-1) ... Setting up libffi8:amd64 (3.5.2-3) ... Setting up dwz (0.16-2) ... Setting up sensible-utils (0.0.26) ... Setting up libuchardet0:amd64 (0.0.8-2) ... Setting up libjs-jquery (3.7.1+dfsg+~3.5.33-1) ... Setting up ruby-did-you-mean (1.6.3-2) ... Setting up openssl (3.5.4-1) ... Setting up ruby-xmlrpc (0.3.3-2) ... Setting up automake (1:1.18.1-3) ... update-alternatives: using /usr/bin/automake-1.18 to provide /usr/bin/automake (automake) in auto mode Setting up libfile-stripnondeterminism-perl (1.15.0-1) ... Setting up libjs-jquery-easing (12-4) ... Setting up libjs-jquery-fancybox (12-4) ... Setting up gettext (0.23.2-1) ... Setting up libgmp-dev:amd64 (2:6.3.0+dfsg-5) ... Setting up libtool (2.5.4-9) ... Setting up intltool-debian (0.35.0+20060710.6) ... Setting up dh-autoreconf (21) ... Setting up ca-certificates (20250419) ... Updating certificates in /etc/ssl/certs... 150 added, 0 removed; done. Setting up libjs-jquery-ui (1.13.2+dfsg-1) ... Setting up dh-strip-nondeterminism (1.15.0-1) ... Setting up groff-base (1.23.0-10) ... Setting up po-debconf (1.0.22) ... Setting up rubygems-integration (1.19) ... Setting up man-db (2.13.1-1) ... Not building database; man-db/auto-update is not 'true'. Setting up debhelper (13.29) ... Setting up rake (13.2.1-1) ... Setting up libruby3.3:amd64 (3.3.8-2) ... Setting up ruby-rubygems (3.6.7-2) ... Setting up ruby3.3-dev:amd64 (3.3.8-2) ... Setting up ruby3.3 (3.3.8-2) ... Setting up libruby:amd64 (1:3.3+b1) ... Setting up ruby-all-dev:amd64 (1:3.3+b1) ... Setting up ruby (1:3.3+b1) ... Setting up ruby-rspec-core (3.13.0c0e0m0s1-2) ... Setting up ruby-docile (1.1.5-3) ... Setting up ruby-ffi:amd64 (1.17.2+dfsg-1+rebuild1766547583) ... Setting up ruby-diff-lcs (1.6.2-1) ... Setting up ruby-simplecov-html (0.12.3-2) ... Setting up gem2deb-test-runner (2.2.6) ... Setting up ruby-simplecov (0.22.0-2) ... Setting up ruby-rspec-expectations (3.13.0c0e0m0s1-2) ... Setting up ruby-rbnacl (7.1.1-1) ... Setting up ruby-rspec-mocks (3.13.0c0e0m0s1-2) ... Setting up gem2deb (2.2.6) ... Setting up ruby-rspec (3.13.0c0e0m0s1-2) ... Setting up sbuild-build-depends-main-dummy (0.invalid.0) ... Processing triggers for libc-bin (2.42-6) ... Processing triggers for ca-certificates (20250419) ... Updating certificates in /etc/ssl/certs... 0 added, 0 removed; done. Running hooks in /etc/ca-certificates/update.d... done. +------------------------------------------------------------------------------+ | Check architectures Wed, 24 Dec 2025 15:34:21 +0000 | +------------------------------------------------------------------------------+ Arch check ok (amd64 included in all) +------------------------------------------------------------------------------+ | Build environment Wed, 24 Dec 2025 15:34:22 +0000 | +------------------------------------------------------------------------------+ Kernel: Linux 6.12.57+deb13-cloud-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.12.57-1 (2025-11-05) amd64 (x86_64) Toolchain package versions: binutils_2.45.50.20251209-1 dpkg-dev_1.23.3 g++-15_15.2.0-12 gcc-15_15.2.0-12 libc6-dev_2.42-6 libstdc++-15-dev_15.2.0-12 libstdc++6_15.2.0-12 linux-libc-dev_6.17.13-1 Package versions: apt_3.1.12 autoconf_2.72-3.1 automake_1:1.18.1-3 autopoint_0.23.2-1 autotools-dev_20240727.1 base-files_14 base-passwd_3.6.8 bash_5.3-1 binutils_2.45.50.20251209-1 binutils-common_2.45.50.20251209-1 binutils-x86-64-linux-gnu_2.45.50.20251209-1 bsdextrautils_2.41.3-2 build-essential_12.12 bzip2_1.0.8-6 ca-certificates_20250419 coreutils_9.7-3 cpp_4:15.2.0-4 cpp-15_15.2.0-12 cpp-15-x86-64-linux-gnu_15.2.0-12 cpp-x86-64-linux-gnu_4:15.2.0-4 dash_0.5.12-12 debconf_1.5.91 debhelper_13.29 debian-archive-keyring_2025.1 debianutils_5.23.2 dh-autoreconf_21 dh-strip-nondeterminism_1.15.0-1 diffutils_1:3.12-1 dpkg_1.23.3 dpkg-dev_1.23.3 dwz_0.16-2 file_1:5.46-5 findutils_4.10.0-3 g++_4:15.2.0-4 g++-15_15.2.0-12 g++-15-x86-64-linux-gnu_15.2.0-12 g++-x86-64-linux-gnu_4:15.2.0-4 gcc_4:15.2.0-4 gcc-15_15.2.0-12 gcc-15-base_15.2.0-12 gcc-15-x86-64-linux-gnu_15.2.0-12 gcc-x86-64-linux-gnu_4:15.2.0-4 gem2deb_2.2.6 gem2deb-test-runner_2.2.6 gettext_0.23.2-1 gettext-base_0.23.2-1 grep_3.12-1 groff-base_1.23.0-10 gzip_1.13-1 hostname_3.25 init-system-helpers_1.69 intltool-debian_0.35.0+20060710.6 libacl1_2.3.2-2+b1 libapt-pkg7.0_3.1.12 libarchive-zip-perl_1.68-1 libasan8_15.2.0-12 libatomic1_15.2.0-12 libattr1_1:2.5.2-3 libaudit-common_1:4.1.2-1 libaudit1_1:4.1.2-1+b1 libbinutils_2.45.50.20251209-1 libblkid1_2.41.3-2 libbz2-1.0_1.0.8-6 libc-bin_2.42-6 libc-dev-bin_2.42-6 libc-gconv-modules-extra_2.42-6 libc6_2.42-6 libc6-dev_2.42-6 libcap-ng0_0.8.5-4+b2 libcap2_1:2.75-10+b5 libcc1-0_15.2.0-12 libcrypt-dev_1:4.5.1-1 libcrypt1_1:4.5.1-1 libctf-nobfd0_2.45.50.20251209-1 libctf0_2.45.50.20251209-1 libdb5.3t64_5.3.28+dfsg2-11 libdebconfclient0_0.282+b2 libdebhelper-perl_13.29 libdpkg-perl_1.23.3 libelf1t64_0.194-1 libffi8_3.5.2-3 libfile-stripnondeterminism-perl_1.15.0-1 libgcc-15-dev_15.2.0-12 libgcc-s1_15.2.0-12 libgdbm-compat4t64_1.26-1 libgdbm6t64_1.26-1 libgmp-dev_2:6.3.0+dfsg-5 libgmp10_2:6.3.0+dfsg-5 libgmpxx4ldbl_2:6.3.0+dfsg-5 libgomp1_15.2.0-12 libgprofng0_2.45.50.20251209-1 libhogweed6t64_3.10.2-1 libhwasan0_15.2.0-12 libisl23_0.27-1 libitm1_15.2.0-12 libjansson4_2.14-2+b4 libjs-jquery_3.7.1+dfsg+~3.5.33-1 libjs-jquery-easing_12-4 libjs-jquery-fancybox_12-4 libjs-jquery-mousewheel_1:3.1.13-5 libjs-jquery-ui_1.13.2+dfsg-1 liblsan0_15.2.0-12 liblz4-1_1.10.0-6 liblzma5_5.8.1-2 libmagic-mgc_1:5.46-5 libmagic1t64_1:5.46-5 libmd0_1.1.0-2+b1 libmount1_2.41.3-2 libmpc3_1.3.1-2 libmpfr6_4.2.2-2 libnettle8t64_3.10.2-1 libpam-modules_1.7.0-5 libpam-modules-bin_1.7.0-5 libpam-runtime_1.7.0-5 libpam0g_1.7.0-5 libpcre2-8-0_10.46-1 libperl5.40_5.40.1-7 libpipeline1_1.5.8-2 libquadmath0_15.2.0-12 libruby_1:3.3+b1 libruby3.3_3.3.8-2 libseccomp2_2.6.0-2+b1 libselinux1_3.9-4+rebuild1766544377 libsframe2_2.45.50.20251209-1 libsmartcols1_2.41.3-2 libsodium23_1.0.18-1+b2 libssl3t64_3.5.4-1 libstdc++-15-dev_15.2.0-12 libstdc++6_15.2.0-12 libsystemd0_259-1 libtinfo6_6.5+20251123-1 libtool_2.5.4-9 libtsan2_15.2.0-12 libubsan1_15.2.0-12 libuchardet0_0.0.8-2 libudev1_259-1 libunistring5_1.3-2 libuuid1_2.41.3-2 libxml2-16_2.15.1+dfsg-2+b1 libxxhash0_0.8.3-2 libyaml-0-2_0.2.5-2+b1 libzstd1_1.5.7+dfsg-2 linux-libc-dev_6.17.13-1 m4_1.4.20-2 make_4.4.1-3 man-db_2.13.1-1 mawk_1.3.4.20250131-2 ncurses-base_6.5+20251123-1 ncurses-bin_6.5+20251123-1 openssl_3.5.4-1 openssl-provider-legacy_3.5.4-1 patch_2.8-2 perl_5.40.1-7 perl-base_5.40.1-7 perl-modules-5.40_5.40.1-7 po-debconf_1.0.22 rake_13.2.1-1 rpcsvc-proto_1.4.3-1 ruby_1:3.3+b1 ruby-all-dev_1:3.3+b1 ruby-csv_3.3.4-1 ruby-did-you-mean_1.6.3-2 ruby-diff-lcs_1.6.2-1 ruby-docile_1.1.5-3 ruby-ffi_1.17.2+dfsg-1+rebuild1766547583 ruby-minitest_5.26.1-1 ruby-net-telnet_0.2.0-1 ruby-power-assert_2.0.5-1 ruby-rbnacl_7.1.1-1 ruby-rspec_3.13.0c0e0m0s1-2 ruby-rspec-core_3.13.0c0e0m0s1-2 ruby-rspec-expectations_3.13.0c0e0m0s1-2 ruby-rspec-mocks_3.13.0c0e0m0s1-2 ruby-rspec-support_3.13.0c0e0m0s1-2 ruby-ruby2-keywords_0.0.5-1 ruby-rubygems_3.6.7-2 ruby-simplecov_0.22.0-2 ruby-simplecov-html_0.12.3-2 ruby-test-unit_3.6.2-1 ruby-webrick_1.9.1-1 ruby-xmlrpc_0.3.3-2 ruby3.3_3.3.8-2 ruby3.3-dev_3.3.8-2 rubygems-integration_1.19 sbuild-build-depends-main-dummy_0.invalid.0 sed_4.9-2 sensible-utils_0.0.26 sqv_1.3.0-5 sysvinit-utils_3.15-6 tar_1.35+dfsg-3.1 util-linux_2.41.3-2 xz-utils_5.8.1-2 zlib1g_1:1.3.dfsg+really1.3.1-1+b2 +------------------------------------------------------------------------------+ | Build Wed, 24 Dec 2025 15:34:22 +0000 | +------------------------------------------------------------------------------+ Unpack source ------------- Format: 3.0 (quilt) Source: ruby-jwt Binary: ruby-jwt Architecture: all Version: 3.1.2-1+rebuild1766590433 Maintainer: Debian Ruby Team Uploaders: Markus Tornow , Pirate Praveen Homepage: https://github.com/jwt/ruby-jwt Standards-Version: 4.7.2 Vcs-Browser: https://salsa.debian.org/ruby-team/ruby-jwt Vcs-Git: https://salsa.debian.org/ruby-team/ruby-jwt.git Testsuite: autopkgtest-pkg-ruby Build-Depends: debhelper-compat (= 13), gem2deb (>= 1), rake, ruby-rspec, ruby-rbnacl, ruby-simplecov Package-List: ruby-jwt deb ruby optional arch=all Checksums-Sha1: 89508e7601494f44f35fd23a603fa155378e8fd1 88322 ruby-jwt_3.1.2.orig.tar.gz ff74f1f28f0d6669ab34d3f43e10bbb24b27bba1 4740 ruby-jwt_3.1.2-1+rebuild1766590433.debian.tar.xz Checksums-Sha256: d17b812913ee6321cbb3a06c0d1e28d5bdac04299ddb1a4f68bfe873ce420ad7 88322 ruby-jwt_3.1.2.orig.tar.gz af27480fddd6c7ba3deb9c3804f623afaa5ec6c6855de3371a5e458694194040 4740 ruby-jwt_3.1.2-1+rebuild1766590433.debian.tar.xz Files: 4752977f8adb2b218d3758b160b940b4 88322 ruby-jwt_3.1.2.orig.tar.gz 79357df79fbd9d376425aeade01cfe9d 4740 ruby-jwt_3.1.2-1+rebuild1766590433.debian.tar.xz dpkg-source: warning: extracting unsigned source package (ruby-jwt_3.1.2-1+rebuild1766590433.dsc) dpkg-source: info: extracting ruby-jwt in /build/reproducible-path/ruby-jwt-3.1.2 dpkg-source: info: unpacking ruby-jwt_3.1.2.orig.tar.gz dpkg-source: info: unpacking ruby-jwt_3.1.2-1+rebuild1766590433.debian.tar.xz dpkg-source: info: using patch list from debian/patches/series dpkg-source: info: applying no-pending-tests.patch Check disk space ---------------- Sufficient free space for build +------------------------------------------------------------------------------+ | Starting Timed Build Commands Wed, 24 Dec 2025 15:34:23 +0000 | +------------------------------------------------------------------------------+ apt-get update -q && apt-get install -t experimental -qy ruby-all-dev --------------------------------------------------------------------- Ign:1 copy:/build/reproducible-path/resolver-qRSzvB/apt_archive ./ InRelease Ign:2 file:/mass-rebuild ./ InRelease Get:3 copy:/build/reproducible-path/resolver-qRSzvB/apt_archive ./ Release [609 B] Get:4 file:/mass-rebuild ./ Release [1617 B] Ign:5 copy:/build/reproducible-path/resolver-qRSzvB/apt_archive ./ Release.gpg Get:4 file:/mass-rebuild ./ Release [1617 B] Ign:6 file:/mass-rebuild ./ Release.gpg Hit:7 http://deb.debian.org/debian unstable InRelease Hit:8 http://deb.debian.org/debian experimental InRelease Hit:9 http://incoming.debian.org/debian-buildd buildd-unstable InRelease Fetched 609 B in 0s (1472 B/s) Reading package lists... Reading package lists... Building dependency tree... Reading state information... Solving dependencies... The following additional packages will be installed: libruby3.4 ruby3.4 ruby3.4-dev Recommended packages: ruby-sdbm fonts-lato ruby3.4-doc The following NEW packages will be installed: libruby3.4 ruby3.4 ruby3.4-dev The following packages will be upgraded: ruby-all-dev 1 upgraded, 3 newly installed, 0 to remove and 26 not upgraded. Need to get 8784 kB of archives. After this operation, 36.3 MB of additional disk space will be used. Get:1 http://deb.debian.org/debian experimental/main amd64 libruby3.4 amd64 3.4.5-1~exp1 [6731 kB] Get:2 http://deb.debian.org/debian experimental/main amd64 ruby3.4 amd64 3.4.5-1~exp1 [920 kB] Get:3 http://deb.debian.org/debian experimental/main amd64 ruby3.4-dev amd64 3.4.5-1~exp1 [1127 kB] Get:4 http://deb.debian.org/debian experimental/main amd64 ruby-all-dev amd64 1:3.3+support3.4~0 [6292 B] debconf: unable to initialize frontend: Dialog debconf: (TERM is not set, so the dialog frontend is not usable.) debconf: falling back to frontend: Readline Fetched 8784 kB in 0s (90.2 MB/s) Selecting previously unselected package libruby3.4:amd64. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19691 files and directories currently installed.) Preparing to unpack .../libruby3.4_3.4.5-1~exp1_amd64.deb ... Unpacking libruby3.4:amd64 (3.4.5-1~exp1) ... Selecting previously unselected package ruby3.4. Preparing to unpack .../ruby3.4_3.4.5-1~exp1_amd64.deb ... Unpacking ruby3.4 (3.4.5-1~exp1) ... Selecting previously unselected package ruby3.4-dev:amd64. Preparing to unpack .../ruby3.4-dev_3.4.5-1~exp1_amd64.deb ... Unpacking ruby3.4-dev:amd64 (3.4.5-1~exp1) ... Preparing to unpack .../ruby-all-dev_1%3a3.3+support3.4~0_amd64.deb ... Unpacking ruby-all-dev:amd64 (1:3.3+support3.4~0) over (1:3.3+b1) ... Setting up libruby3.4:amd64 (3.4.5-1~exp1) ... Setting up ruby3.4 (3.4.5-1~exp1) ... Setting up ruby3.4-dev:amd64 (3.4.5-1~exp1) ... Setting up ruby-all-dev:amd64 (1:3.3+support3.4~0) ... Processing triggers for man-db (2.13.1-1) ... Not building database; man-db/auto-update is not 'true'. Processing triggers for libc-bin (2.42-6) ... I: Finished running 'apt-get update -q && apt-get install -t experimental -qy ruby-all-dev'. Finished processing commands. -------------------------------------------------------------------------------- User Environment ---------------- APT_CONFIG=/var/lib/sbuild/apt.conf HOME=/sbuild-nonexistent LANG=C.UTF-8 LC_ADDRESS=pt_BR.UTF-8 LC_ALL=C.UTF-8 LC_IDENTIFICATION=pt_BR.UTF-8 LC_MEASUREMENT=pt_BR.UTF-8 LC_MONETARY=pt_BR.UTF-8 LC_NAME=pt_BR.UTF-8 LC_NUMERIC=pt_BR.UTF-8 LC_PAPER=pt_BR.UTF-8 LC_TELEPHONE=pt_BR.UTF-8 LC_TIME=pt_BR.UTF-8 LOGNAME=sbuild PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games SHELL=/bin/sh USER=sbuild dpkg-buildpackage ----------------- Command: dpkg-buildpackage --sanitize-env -us -uc -mAutomated rebuild -b dpkg-buildpackage: info: source package ruby-jwt dpkg-buildpackage: info: source version 3.1.2-1+rebuild1766590433 dpkg-buildpackage: info: source distribution UNRELEASED dpkg-source --before-build . dpkg-buildpackage: info: host architecture amd64 debian/rules clean dh clean --buildsystem=ruby --with ruby dh_auto_clean -O--buildsystem=ruby dh_ruby --clean dh_autoreconf_clean -O--buildsystem=ruby dh_clean -O--buildsystem=ruby debian/rules binary dh binary --buildsystem=ruby --with ruby dh_update_autotools_config -O--buildsystem=ruby dh_autoreconf -O--buildsystem=ruby dh_auto_configure -O--buildsystem=ruby dh_ruby --configure dh_auto_build -O--buildsystem=ruby dh_ruby --build dh_auto_test -O--buildsystem=ruby dh_ruby --test create-stamp debian/debhelper-build-stamp dh_testroot -O--buildsystem=ruby dh_prep -O--buildsystem=ruby dh_auto_install --destdir=debian/ruby-jwt/ -O--buildsystem=ruby dh_ruby --install /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt ┌──────────────────────────────────────────────────────────────────────────────┐ │ ruby-jwt: Installing files and building extensions for ruby3.3 │ └──────────────────────────────────────────────────────────────────────────────┘ /usr/bin/ruby3.3 -S gem build --config-file /dev/null --verbose /tmp/d20251224-64-3b330d/gemspec WARNING: open-ended dependency on base64 (>= 0) is not recommended use a bounded requirement, such as "~> x.y" WARNING: open-ended dependency on appraisal (>= 0, development) is not recommended use a bounded requirement, such as "~> x.y" WARNING: open-ended dependency on bundler (>= 0, development) is not recommended use a bounded requirement, such as "~> x.y" WARNING: open-ended dependency on irb (>= 0, development) is not recommended use a bounded requirement, such as "~> x.y" WARNING: open-ended dependency on logger (>= 0, development) is not recommended use a bounded requirement, such as "~> x.y" WARNING: open-ended dependency on rake (>= 0, development) is not recommended use a bounded requirement, such as "~> x.y" WARNING: open-ended dependency on rspec (>= 0, development) is not recommended use a bounded requirement, such as "~> x.y" WARNING: open-ended dependency on rubocop (>= 0, development) is not recommended use a bounded requirement, such as "~> x.y" WARNING: open-ended dependency on simplecov (>= 0, development) is not recommended use a bounded requirement, such as "~> x.y" WARNING: See https://guides.rubygems.org/specification-reference/ for help Successfully built RubyGem Name: jwt Version: 3.1.2 File: jwt-3.1.2.gem /usr/bin/ruby3.3 -S gem install --config-file /dev/null --verbose --local --verbose --no-document --ignore-dependencies --install-dir debian/ruby-jwt/usr/share/rubygems-integration/all /tmp/d20251224-64-3b330d/jwt-3.1.2.gem /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/base64.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/audience.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/crit.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/decode_verifier.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/expiration.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/issued_at.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/issuer.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/jwt_id.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/not_before.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/numeric.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/required.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/subject.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/verifier.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/configuration.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/configuration/container.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/configuration/decode_configuration.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/configuration/jwk_configuration.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/decode.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/encode.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/encoded_token.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/error.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/json.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwa.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwa/ecdsa.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwa/hmac.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwa/none.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwa/ps.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwa/rsa.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwa/signing_algorithm.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwa/unsupported.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk/ec.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk/hmac.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk/key_base.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk/key_finder.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk/kid_as_key_digest.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk/rsa.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk/set.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk/thumbprint.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/token.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/version.rb /build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/x5c_key_finder.rb Successfully installed jwt-3.1.2 1 gem installed cd debian/ruby-jwt/usr/share/rubygems-integration/all rm -rf bin rm -rf build_info rm -rf cache rm -rf doc rm -rf extensions rmdir plugins cd gems/jwt-3.1.2 rm -f chmod 644 lib/jwt/base64.rb lib/jwt/claims/audience.rb lib/jwt/claims/crit.rb lib/jwt/claims/decode_verifier.rb lib/jwt/claims/expiration.rb lib/jwt/claims/issued_at.rb lib/jwt/claims/issuer.rb lib/jwt/claims/jwt_id.rb lib/jwt/claims/not_before.rb lib/jwt/claims/numeric.rb lib/jwt/claims/required.rb lib/jwt/claims/subject.rb lib/jwt/claims/verifier.rb lib/jwt/claims.rb lib/jwt/configuration/container.rb lib/jwt/configuration/decode_configuration.rb lib/jwt/configuration/jwk_configuration.rb lib/jwt/configuration.rb lib/jwt/decode.rb lib/jwt/encode.rb lib/jwt/encoded_token.rb lib/jwt/error.rb lib/jwt/json.rb lib/jwt/jwa/ecdsa.rb lib/jwt/jwa/hmac.rb lib/jwt/jwa/none.rb lib/jwt/jwa/ps.rb lib/jwt/jwa/rsa.rb lib/jwt/jwa/signing_algorithm.rb lib/jwt/jwa/unsupported.rb lib/jwt/jwa.rb lib/jwt/jwk/ec.rb lib/jwt/jwk/hmac.rb lib/jwt/jwk/key_base.rb lib/jwt/jwk/key_finder.rb lib/jwt/jwk/kid_as_key_digest.rb lib/jwt/jwk/rsa.rb lib/jwt/jwk/set.rb lib/jwt/jwk/thumbprint.rb lib/jwt/jwk.rb lib/jwt/token.rb lib/jwt/version.rb lib/jwt/x5c_key_finder.rb lib/jwt.rb find lib/ -type d -empty -delete cd - cd - dh_installchangelogs -pruby-jwt /build/reproducible-path/ruby-jwt-3.1.2/CHANGELOG.md upstream /usr/bin/ruby3.3 /usr/bin/gem2deb-test-runner ┌──────────────────────────────────────────────────────────────────────────────┐ │ Checking Rubygems dependency resolution on ruby3.3 │ └──────────────────────────────────────────────────────────────────────────────┘ RUBYLIB=. GEM_PATH=/build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all:/build/reproducible-path/ruby-jwt-3.1.2/debian/.debhelper/generated/_source/home/.local/share/gem/ruby/3.3.0:/var/lib/gems/3.3.0:/usr/local/lib/ruby/gems/3.3.0:/usr/lib/ruby/gems/3.3.0:/usr/lib/x86_64-linux-gnu/ruby/gems/3.3.0:/usr/share/rubygems-integration/3.3.0:/usr/share/rubygems-integration/all:/usr/lib/x86_64-linux-gnu/rubygems-integration/3.3.0 ruby3.3 -e gem\ \"jwt\" ┌──────────────────────────────────────────────────────────────────────────────┐ │ Run tests for ruby3.3 from debian/ruby-tests.rake │ └──────────────────────────────────────────────────────────────────────────────┘ RUBYLIB=. GEM_PATH=/build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all:/build/reproducible-path/ruby-jwt-3.1.2/debian/.debhelper/generated/_source/home/.local/share/gem/ruby/3.3.0:/var/lib/gems/3.3.0:/usr/local/lib/ruby/gems/3.3.0:/usr/lib/ruby/gems/3.3.0:/usr/lib/x86_64-linux-gnu/ruby/gems/3.3.0:/usr/share/rubygems-integration/3.3.0:/usr/share/rubygems-integration/all:/usr/lib/x86_64-linux-gnu/rubygems-integration/3.3.0 ruby3.3 -S rake --rakelibdir /gem2deb-nonexistent -f debian/ruby-tests.rake /usr/bin/ruby3.3 -I/usr/share/rubygems-integration/all/gems/rspec-support-3.13.1/lib:/usr/share/rubygems-integration/all/gems/rspec-core-3.13.0/lib /usr/share/rubygems-integration/all/gems/rspec-core-3.13.0/exe/rspec --pattern ./spec/\*\*/\*_spec.rb --format documentation Warning: Error occurred while trying to load /build/reproducible-path/ruby-jwt-3.1.2/.simplecov. Error message: cannot load such file -- simplecov_json_formatter OpenSSL::VERSION: 3.2.0 OpenSSL::OPENSSL_VERSION: OpenSSL 3.5.0 8 Apr 2025 OpenSSL::OPENSSL_LIBRARY_VERSION: OpenSSL 3.5.4 30 Sep 2025 Run options: include {:focus=>true} All examples were filtered out; ignoring {:focus=>true} Randomized with seed 30800 JWT::Token #jwt when token is signed returns a signed and encoded token when token is not signed returns a signed and encoded token when alg is given in header returns a signed and encoded token #valid_claims? exp claim when claim is valid returns true when claim is invalid returns true #detach_payload! before token is signed detaches the payload #verify_claims! when required_claims is passed raises error when EC JWK is given as key signs the token #sign! signs the token when signed twice raises when RSA JWK is given as key signs the token with mismatching algorithm provided in sign call signs the token with algorithm provided in sign call signs the token when string key is given but not algorithm raises an error #claim_errors exp claim when claim is valid returns empty array when claim is invalid returns array with error objects JWT::Claims::JwtId when jti validator is a proc returning false raises JWT::InvalidJtiError when jti validator has 2 args the second arg is the payload when jti validator has 2 args passes validation when jti validator is a proc returning true passes validation when payload is missing a jti raises JWT::InvalidJtiError when payload contains a jti that is an empty string raises JWT::InvalidJtiError when payload contains a jti that is a blank string raises JWT::InvalidJtiError when payload contains a jti passes validation JWT .gem_version returns the gem version VERSION constants has a TINY version has a PRE version has a STRING version has a MINOR version has a MAJOR version JWT::Claims .payload_errors various types of params when payload is most of the claims raises an error exp claim when claim is valid returns empty array when claim is invalid returns array with error objects .verify_payload! when required_claims is passed raises error exp claim verifies the exp when claims given as symbol validates the claim when claims given as a list of symbols validates the claim when claims given as a list of symbols and hashes validates the claim .valid_payload? exp claim when claim is valid returns true when claim is invalid returns false various types of params when payload is missing most of the claims raises an error when payload has everything that is expected of it does not raise README.md code test custom algorithm example allows a module to be used as algorithm on encode and decode algorithm usage decodes with HMAC algorithm without secret key RSASSA-PSS NONE RSA ECDSA decodes with HMAC algorithm with secret key claims JWK import and export JWK with thumbprint as kid via symbol sub jti JWK with thumbprint as kid via type JWK with thumbprint given in the initializer (legacy) JWK with thumbprint given in the initializer find_key iss required_claims exp with leeway without leeway nbf without leeway with leeway iat with leeway without leeway The JWKS loader example works as expected (legacy) works as expected custom header fields with custom field aud string array The JWK based encode/decode routine works as expected JWK to verify a signature allows to verify a signature with a JWK JWT::Claims::IssuedAt when iat is now as a integer passes validation when iat is in the future fails validation when iat is not a number fails validation when payload is a string containing iat passes validation when iat is now passes validation JWT::JWA::Hmac #verify when signature is valid is expected to equal true when signature is invalid is expected to equal false #sign when nil hmac_secret is passed when OpenSSL raises any other error raises the original error when other versions of openssl do not raise an exception is expected to eql "C\xB0\xCE\xF9\x92e\xF9\xE3L\x10\xEA\x9D5\x01\x92m'\xB3\x9FW\xC6\xD6tV\x1D\x8B\xA26\xE7\xA8\x19\xFB" when OpenSSL 3.0 raises a malloc failure raises JWT::DecodeError when signing with a key is expected to eq "<8WH\xB9\xC2\x96\r\x12\x94L\xF5^[\xC9@o[\xA7\x9C+\x94)q\xA8\x9C\x89\f\v\x1F:a" when hmac_secret is passed when OpenSSL 3.0 raises a malloc failure raises the original error when other versions of openssl do not raise an exception is expected to eql "\x88\xCD!\b\xB54}\x97<\xF3\x9C\xDF\x90S\xD7\xDDBpHv\xD8\xC9\xA9\xBD\x8E-\x16\x82Y\xD3\xDD\xF7" when OpenSSL raises any other error raises the original error when blank hmac_secret is passed when other versions of openssl do not raise an exception is expected to eql "C\xB0\xCE\xF9\x92e\xF9\xE3L\x10\xEA\x9D5\x01\x92m'\xB3\x9FW\xC6\xD6tV\x1D\x8B\xA26\xE7\xA8\x19\xFB" when OpenSSL 3.0 raises a malloc failure raises JWT::DecodeError when OpenSSL raises any other error raises the original error JWT::JWK::RSA .common_parameters when a common parameters hash is given converts string keys to symbol keys imports the common parameter #keypair warns to stderr .create_rsa_key_using_sets when all key components n, e, d, p, q, dp, dq, qi are given creates a valid RSA object representing a public key (PENDING: OpenSSL 3.0 does not allow mutating objects anymore) when only e, n, d, p and q are given raises an error telling all the exponents are required (PENDING: OpenSSL 3.0 does not allow mutating objects anymore) when e, n, d is given creates a valid RSA object representing a private key (PENDING: OpenSSL 3.0 does not allow mutating objects anymore) can be used for signing and verification (PENDING: OpenSSL 3.0 does not allow mutating objects anymore) can be used for encryption and decryption (PENDING: OpenSSL 3.0 does not allow mutating objects anymore) when public parameters (e, n) are given creates a valid RSA object representing a public key (PENDING: OpenSSL 3.0 does not allow mutating objects anymore) .create_rsa_key_using_der when all key components n, e, d, p, q, dp, dq, qi are given creates a valid RSA object representing a public key when e, n, d is given expects all CRT parameters given and raises error when public parameters (e, n) are given creates a valid RSA object representing a public key when only e, n, d, p and q are given raises an error telling all the exponents are required .new when a keypair with only public key is given creates an instance of the class when a keypair with both keys given creates an instance of the class #verify when the jwk has HS256 as the alg parameter raises JWT::DecodeError when the signature is valid returns true when the jwk is missing the alg header raises JWT::JWKError when the jwk has none as the alg parameter raises JWT::JWKError when the signature is invalid returns false when the jwk has an invalid alg header raises JWT::VerificationError .kid when kid is given as a String parameter uses the given kid when kid is given in a hash parameter uses the given kid when configuration says to use :rfc7638_thumbprint generates the kid based on the thumbprint .import when keypair is imported with string keys from JSON returns a hash with the public parts of the key when keypair is imported with symbol keys returns a hash with the public parts of the key when private key is included in the data creates a complete keypair when jwk_data is given without e and/or n raises an error .create_rsa_key_using_accessors when all key components n, e, d, p, q, dp, dq, qi are given creates a valid RSA object representing a public key (PENDING: OpenSSL if RSA#d= is not available there is no accessors anymore) when only e, n, d, p and q are given raises an error telling all the exponents are required (PENDING: OpenSSL if RSA#d= is not available there is no accessors anymore) when public parameters (e, n) are given creates a valid RSA object representing a public key (PENDING: OpenSSL if RSA#d= is not available there is no accessors anymore) when e, n, d is given can be used for encryption and decryption (PENDING: OpenSSL if RSA#d= is not available there is no accessors anymore) creates a valid RSA object representing a private key (PENDING: OpenSSL if RSA#d= is not available there is no accessors anymore) can be used for signing and verification (PENDING: OpenSSL if RSA#d= is not available there is no accessors anymore) #export when private key is requested returns a hash with the public AND private parts of the key when keypair with private key is exported returns a hash with the public parts of the key when keypair with public key is exported returns a hash with the public parts of the key when unsupported keypair is given raises an error JWT::Claims::Verifier .verify! when all claims are given verifies all claims JWT::X5cKeyFinder returns the public key from a certificate that is signed by trusted roots and not revoked certificate expired raises an error signature could not be verified with the given trusted roots raises an error revoked raises an error could not be chained to a trusted root certificate given nil raises a decode error given an array raises a verification error CRL expired raises an error signature could not be verified with the given trusted roots raises an error not given raises an error ::JWT.decode returns the encoded payload after successful certificate path verification already parsed certificates returns the public key from a certificate that is signed by trusted roots and not revoked JWT::Claims::NotBefore #verify! when nbf is in the past does not raise error when leeway is given does not raise error when nbf is in the future raises JWT::ImmatureSignature JWT::JWA::Ps #verify when verification results in a OpenSSL::PKey::PKeyError error raises a JWT::VerificationError with a valid RSA key verifies the signature with PS256 verifies the signature with PS384 verifies the signature with PS512 with an invalid signature raises a verification error #sign with a valid RSA key signs the data with PS256 signs the data with PS512 signs the data with PS384 with a key length less than 2048 bits raises an error with an invalid key raises an error #initialize initializes with the correct algorithm and digest JWT::Claims::Expiration when token is not a Hash passes validation when token exp is set to current time fails validation when token is expired but some leeway is defined passes validation when token is expired must raise JWT::ExpiredSignature when the token has expired JWT::JWA::Unsupported .sign raises an error for unsupported signing method .verify raises an error for unsupported algorithm JWT::Claims::Numeric #verify! exp claim it should behave like a NumericDate claim when exp payload is a float does not raise error when exp payload is a string raises error and key is a string raises error when exp payload is a string raises error when exp payload is an integer does not raise error and key is a string does not raise error when exp payload is a Time object raises error iat claim it should behave like a NumericDate claim when iat payload is a string raises error when iat payload is a Time object raises error when iat payload is a string raises error and key is a string raises error when iat payload is a float does not raise error when iat payload is an integer does not raise error and key is a string does not raise error nbf claim it should behave like a NumericDate claim when nbf payload is a string raises error when nbf payload is an integer does not raise error and key is a string does not raise error when nbf payload is a Time object raises error when nbf payload is a string raises error and key is a string raises error when nbf payload is a float does not raise error use via ::JWT::Claims.verify_payload! nbf claim it should behave like a NumericDate claim when nbf payload is a float does not raise error when nbf payload is a string raises error when nbf payload is a string raises error and key is a string raises error when nbf payload is an integer does not raise error and key is a string does not raise error when nbf payload is a Time object raises error iat claim it should behave like a NumericDate claim when iat payload is a Time object raises error when iat payload is a string raises error and key is a string raises error when iat payload is a float does not raise error when iat payload is a string raises error when iat payload is an integer does not raise error and key is a string does not raise error exp claim it should behave like a NumericDate claim when exp payload is a Time object raises error when exp payload is an integer does not raise error and key is a string does not raise error when exp payload is a float does not raise error when exp payload is a string raises error when exp payload is a string raises error and key is a string raises error JWT::Claims::Crit when header is an array and not containing the expected value raises an InvalidCritError when header is an array containing exactly the expected values does not raise an error when header is not an array raises JWT::InvalidCritError when header is missing raises JWT::InvalidCritError when header is an array containing at least the expected values does not raise an error JWT::JWA::None #sign returns an empty string #verify returns true JWT::JWA .resolve_and_sort when algorithms have the preferred last places the preferred algorithm first when algorithms have the preferred in the middle places the preferred algorithm first JWT::JWK::HMAC .import when example from RFC decodes the k when secret key is given returns a key with a custom "kid" value imports that "kid" value with a common parameter imports that common parameter .new when a secret key given creates an instance of the class when key is a number raises an ArgumentError #== is not equal to nil is equal to itself is equal to a clone of itself is not equal to boolean true is not equal to a different key is not equal to a non-key #keypair returns a string #<=> is not comparable to a non-key is not comparable to boolean true is equal to itself is equal to a clone of itself is not comparable to nil is not equal to a different key #export when key is exported returns a hash with the key when key is exported with private key returns a hash with the key #[]= when k is given raises an error JWT .decode for JWK usecase mixing algorithms using kid header when HMAC secret is pointed to as RSA public key fails in some way when RSA key is pointed to as HMAC secret raises JWT::DecodeError when EC key is pointed to as RSA public key fails in some way when EC key is pointed to as HMAC secret raises JWT::DecodeError when ES384 key is pointed to as ES512 key fails in some way when HMAC secret is pointed to as EC public key fails in some way when jwk keys are loaded from JSON with string keys decodes the token when jwk keys are rotated decodes the token when the token kid is not a string raises an exception when jwk keys are given as an array and both kid and x5t is in the set is able to decode the token based on the priority of the key defined in key_fields and x5t is in the set is able to decode the token and kid is not in the set raises an exception and kid is in the set is able to decode the token token does not know the kid raises an exception no keys are found in the set raises an exception when JWK features are used manually is able to decode the token when jwk keys are loaded using a proc/lambda decodes the token when the token kid is nil and allow_nil_kid is specified decodes the token JWT::JWK::Thumbprint #to_s when EC key is given is expected to eq "dO52_we59sdR49HsGCpVzlDUQNvT3KxCTGakk4Un8qc" when HMAC key is given is expected to eq "wPf4ZF5qlzoFxsGkft4eu1iWcehgAcahZL4XPV4dT-s" when example from RFC is given is expected to eq "NzbLsXh8uDCcd-6MNwXF4W_7noWXFZAfHkxZsRGC9Xs" JWT::JWK::EC #public_key returns the key #export when a common parameter is given returns a hash including the common parameter when private key is requested returns a hash with the both parts of the key when keypair with private key is exported returns a hash with the both parts of the key when keypair with public key is exported returns a hash with the public parts of the key when a custom "kid" is provided exports it .new when a keypair with both keys given creates an instance of the class when a keypair with only public key is given creates an instance of the class when EC with unsupported curve is given raises an error when a number is given raises an argument error #keypair returns the key .import when crv=P-384 when keypair is private returns a private key with a custom "kid" value imports that "kid" value when keypair is public returns a public key returns a hash with the public parts of the key with missing 0-byte at the start of EC coordinates prepends a 0-byte to either X or Y coordinate so that the keys decode correctly when crv=P-256 when keypair is private returns a private key with a custom "kid" value imports that "kid" value when keypair is public returns a public key returns a hash with the public parts of the key with missing 0-byte at the start of EC coordinates prepends a 0-byte to either X or Y coordinate so that the keys decode correctly with missing 0-byte at the start of EC coordinates prepends a 0-byte to either X or Y coordinate so that the keys decode correctly when crv=P-256K when keypair is private returns a private key with a custom "kid" value imports that "kid" value when keypair is public returns a public key returns a hash with the public parts of the key with missing 0-byte at the start of EC coordinates prepends a 0-byte to either X or Y coordinate so that the keys decode correctly when crv=P-521 when keypair is private returns a private key with a custom "kid" value imports that "kid" value when keypair is public returns a public key returns a hash with the public parts of the key .to_openssl_curve when an invalid curve name is given raises an error when a valid curve name is given returns the corresponding OpenSSL curve name #verify when the jwk has none as the alg parameter raises JWT::JWKError when the jwk has HS256 as the alg parameter raises JWT::DecodeError when jwk has alg parameter when the signature is invalid returns false when the signature is valid returns true when the jwk has an invalid alg header raises JWT::VerificationError when jwk is missing the alg parameter when the signature is valid returns true JWT::Configuration::JwkConfiguration .kid_generator_type= when valid value is passed sets the generator matching the value when invalid value is passed raises ArgumentError JWT JWT.configure yields the configuration allows configuration to be changed via the block JWT::EncodedToken #valid_claims? exp claim when no claims are provided validates the exp claim and returns false when claim is valid returns true when claim is invalid returns true when claim validation skips verifying the exp claim returns true #verify! when claims are invalid raises an error when key is valid does not raise when key is invalid raises an error #verify_signature! when payload is not encoded does not raise when payload is detached when payload provided in separate does not raise when payload is not provided raises VerificationError when key is an array with one valid entry does not raise when key_finder is given can utilize an array provided by keyfinder uses key provided by keyfinder when header has invalid alg value does not raise when JWT::KeyFinder is used as a key_finder uses the keys provided by the JWK key finder when neither key or key_finder is given raises an ArgumentError when RSA JWK is given as a key with algorithms not supported by key provided raises JWT::VerificationError with algorithms supported by key provided uses the JWK for verification with empty algorithm array provided uses the JWK for verification when both key or key_finder is given raises an ArgumentError when key is valid does not raise when algorithm is not given raises an error when algorithm is an empty array raises an error when key is invalid raises an error #unverified_payload is expected to eq {"pay"=>"load"} when payload is not encoded and the b64 crit is enabled handles the payload encoding when payload is detached when payload is not provided raises decode error when payload provided in separate is expected to eq {"pay"=>"load"} when token is the empty string raises decode error #claim_errors exp claim when claim is invalid returns array with error objects when claim is valid returns empty array integration use-cases simple verify HS256 with defaults protects the user from unverified payload access #valid? when claims are invalid returns false when key is valid returns true when claims are provided as an array returns true when key is invalid returns false #header is expected to eq {"alg"=>"HS256"} when token is the empty string raises decode error #signature is expected to be a kind of String #payload when token is verified using #valid_signature? but is not valid raises an error when token is verified using #verify_signature! raises an error when token is checked using #valid_signature? and #valid_claims? is expected to eq {"pay"=>"load"} when token is verified using #verify_signature! and #verify_claims! is expected to eq {"pay"=>"load"} when token is verified using #valid? is expected to eq {"pay"=>"load"} when token is not verified raises an error #signing_input is expected to eq "eyJhbGciOiJIUzI1NiJ9.eyJwYXkiOiJsb2FkIn0" #verify_claims! exp claim verifies the exp when claims given as a list of symbols and hashes validates the claim when claims given as a list of symbols validates the claim when payload is detached when payload is not provided raises decode error when payload provided in separate raises claim verification error when claims given as symbol validates the claim when no claims are provided raises ExpiredSignature error when claim validation skips verifying the exp claim does not raise when required_claims is passed raises error when header contains crits header when expected crits are present passes verification when expected crits are missing raises an error JWT::Claims::Required when payload has the required claims passes validation when payload is missing the required claim raises JWT::MissingRequiredClaim JWT::Claims::Audience #verify! when an array with any value matching the one in the options passes validation when the singular audience does not match raises JWT::InvalidAudError when the payload has an array and none match the supplied value raises JWT::InvalidAudError when any value in payload matches a single expected passes validation when a singular audience payload matching any value in the options array passes validation when an array with any value matching all in the options passes validation when single audience is required passes validation JWT::JWA::Ecdsa #sign when the signing key is a public key raises a JWT::DecodeError when the signing key is valid returns a valid signature when the signing key is invalid raises a JWT::DecodeError when the signing key is not an OpenSSL::PKey::EC instance raises a JWT::DecodeError #verify when the verification key is not an OpenSSL::PKey::EC instance raises a JWT::DecodeError when verification results in a OpenSSL::PKey::PKeyError error raises a JWT::VerificationError when the verification key is a point verifies the signature when the verification key is valid returns false for an invalid signature returns true for a valid signature .curve_by_name when secp256r1 is given is expected to eq {:algorithm=>"ES256", :digest=>"sha256"} when secp521r1 is given is expected to eq {:algorithm=>"ES512", :digest=>"sha512"} when unknown is given raises an error when secp256k1 is given is expected to eq {:algorithm=>"ES256K", :digest=>"sha256"} when prime256v1 is given is expected to eq {:algorithm=>"ES256", :digest=>"sha256"} JWT::JWK .new when a common parameter is given sets the common parameter when RSA key is given is expected to be a kind of JWT::JWK::RSA when kid is given sets the kid when secret key is given is expected to be a kind of JWT::JWK::HMAC when EC key is given is expected to be a kind of JWT::JWK::EC .import creates a ::JWT::JWK::RSA instance when keypair with defined kid is imported returns the predefined kid if jwt_data contains a kid when number is given raises an error when a common JWK parameter is specified returns the defined common JWK parameter when keytype is not supported raises an error parsed from JSON creates a ::JWT::JWK::RSA instance from JSON parsed JWK .[] allows to set common parameters via the key-accessor rejects key parameters as keys via the key-accessor allows to read common parameters via the key-accessor JWT::Claims::Issuer when expected issuer is a string that does not match the payload raises JWT::InvalidIssuerError when issuer is given as a RegExp passes validation when payload does not contain any issuer raises JWT::InvalidIssuerError when issuer is given as a RegExp and payload does not have any issuer raises JWT::InvalidIssuerError when issuer is given as a Proc and does not match the payload raises JWT::InvalidIssuerError when expected issuer is an array that does not match the payload raises JWT::InvalidIssuerError when expected issuer is a string that matches the payload passes validation when expected issuer is an array that matches the payload passes validation when issuer is given as a Proc passes validation when issuer is given as a RegExp and does not match the payload raises JWT::InvalidIssuerError when issuer is given as a Proc and payload does not have any issuer raises JWT::InvalidIssuerError when expected issuer is an array and payload does not have any issuer raises JWT::InvalidIssuerError when issuer is given as a Method instance passes validation JWT::JWA::Ecdsa used across threads for encoding and decoding successfully encodes, decodes, and verifies JWT::JWA::Rsa #sign with an invalid key raises an error with a valid RSA key signs the data with a key length less than 2048 bits raises an error #verify with an invalid signature returns false with an invalid key returns false with a valid RSA key returns true #initialize initializes with the correct algorithm and digest JWT::JWK::Set .export exports the JWKS to Hash .uniq! filters out equal keys .eql? correctly classifies equal sets correctly classifies different sets .new can create an empty set raises an error on invalid inputs can create a set from an array of keys from a JWK from an existing JWT::JWK::Set from a JWKS hash with symbol keys from a JWKS hash with string keys .merge merges two JWKSs when called directly when called via "|" operator when called via .union .reject! filters the keyset .select! filters the keyset JWT should encode string payloads should not raise InvalidPayload exception if payload is an array should not verify token even if the payload has claims when the alg value is given as a header parameter overrides the actual algorithm used should generate the same token ::JWT.decode with verify_iat parameter when iat is exactly the same as Time.now and iat is given as floored integer considers iat valid when iat is exactly the same as Time.now and iat is given as a float considers iat valid when iat is 1 second before Time.now raises an error when token signed with nil and decoded with nil raises JWT::DecodeError alg: RS512 should generate a valid token should decode a valid token using algorithm hash string key should decode a valid token wrong key and verify = false should not raise JWT::DecodeError wrong key should raise JWT::DecodeError alg: PS256 wrong key and verify = false should not raise JWT::DecodeError should generate a valid token should decode a valid token wrong key should raise JWT::DecodeError a token with no segments raises JWT::DecodeError when none token is decoded without verify decodes the token when keyfinder resolves to multiple keys and multiple algorithms given with issue with HS256 keys tries until the first match with issue with ES256 keys tries until the first match tries until the first match alg: HS384 should generate a valid token should decode a valid token wrong secret should raise JWT::DecodeError wrong secret and verify = false should not raise JWT::DecodeError alg: ES256K should decode a valid token wrong key and verify = false should not raise JWT::DecodeError should generate a valid token wrong key should raise JWT::DecodeError alg: HS256 should generate a valid token wrong secret and verify = false should not raise JWT::DecodeError wrong secret should raise JWT::DecodeError should decode a valid token Verify when key given as an array with multiple possible keys should be able to verify signature when multiple keys given as a parameter should be able to verify signature when block returns multiple keys should fail if only invalid keys are given issuer claim if verify_iss is set to false (default option) should not raise JWT::InvalidIssuerError when verify_iss is set to true and no issues given does not raise audience claim when verify_aud is set to true and no audience given does not raise when encoded payload is used to extract key through find_key should be able to verify signature when block returns multiple keys with multiple issuers should be able to verify signature when block returns multiple keys with iss verification should be able to find a key using a block with multiple issuers should be able to find a key using the block passed to decode should be able to verify signature when block returns multiple keys should be able to find a key using the block passed to decode with iss verification algorithm raises error when keyfinder does not find anything should raise JWT::IncorrectAlgorithm when algorithms array does not contain algorithm should raise JWT::IncorrectAlgorithm on mismatch prior to kid public key network call should raise JWT::IncorrectAlgorithm on mismatch no algorithm provided should use the default decode algorithm token is missing algorithm should raise JWT::IncorrectAlgorithm invalid header format should raise JWT::DecodeError 2-segment token should raise JWT::IncorrectAlgorithm claim verification order when two claims are invalid depends on the order of the parameters what error is raised alg: PS512 should decode a valid token wrong key and verify = false should not raise JWT::DecodeError wrong key should raise JWT::DecodeError should generate a valid token ::JWT.decode with x5c parameter calls X5cKeyFinder#from to verify the signature and return the payload when multiple algorithms given starts trying with the algorithm referred in the header when hmac algorithm is used without secret key encodes payload when none token is and decoding without key and with verification decodes the token a token with invalid Base64 segments raises JWT::Base64DecodeError when algorithm is a custom class can be used for encoding can be used for decoding when #sign method is missing allows decoding raises an error on encoding when alg is not matching fails the validation process when class has custom header method uses the provided header when signature is not matching fails the validation process when #verify method is missing can be used for encoding raises error on decoding when multiple custom algorithms are given for decoding tries until the first match when class is not utilizing the ::JWT::JWA::SigningAlgorithm module raises an error alg: ES384 should decode a valid token wrong key and verify = false should not raise JWT::DecodeError wrong key should raise JWT::DecodeError should generate a valid token when the alg is invalid raises JWT::IncorrectAlgorithm error Invalid ECDSA curve_name should raise JWT::IncorrectAlgorithm raises "No verification key available" error algorithm should raise DecodeError when none token is decoded with a key given decodes the token when token ends with a newline char raises an error when keyfinder given with 2 arguments decodes the token when token is missing the alg header raises JWT::IncorrectAlgorithm error when keyfinder given with 3 arguments decodes the token but does not pass the payload when token has null as the alg header raises JWT::IncorrectAlgorithm error alg: HS512 should decode a valid token wrong secret and verify = false should not raise JWT::DecodeError should generate a valid token wrong secret should raise JWT::DecodeError when keyfinder given with 1 argument decodes the token alg: RS256 wrong key and verify = false should not raise JWT::DecodeError should generate a valid token should decode a valid token using algorithm hash string key wrong key should raise JWT::DecodeError should decode a valid token a token with not too many segments raises JWT::DecodeError alg: ES512 wrong key should raise JWT::DecodeError should generate a valid token wrong key and verify = false should not raise JWT::DecodeError should decode a valid token alg: ES256 wrong key should raise JWT::DecodeError should decode a valid token wrong key and verify = false should not raise JWT::DecodeError should generate a valid token when token ends with a newline char and strict_decoding enabled raises JWT::DecodeError a token with two segments but does not require verifying raises something else than "Not enough or too many segments" algorithm case insensitivity raises error for invalid algorithm ignores algorithm casing during encode/decode a token with not enough segments raises JWT::DecodeError alg: PS384 should generate a valid token wrong key and verify = false should not raise JWT::DecodeError wrong key should raise JWT::DecodeError should decode a valid token alg: NONE should generate a valid token decoding with verification without specifying the none algorithm should fail to decode the token specifying the none algorithm when the claims are invalid should fail to decode the token when the claims are valid should decode the token decoding without verification should decode a valid token alg: RS384 wrong key and verify = false should not raise JWT::DecodeError should decode a valid token should decode a valid token using algorithm hash string key wrong key should raise JWT::DecodeError should generate a valid token Pending: (Failures listed here are expected and do not affect your suite's status) 1) JWT::JWK::RSA.create_rsa_key_using_sets when all key components n, e, d, p, q, dp, dq, qi are given creates a valid RSA object representing a public key # OpenSSL 3.0 does not allow mutating objects anymore # ./spec/jwt/jwk/rsa_spec.rb:217 2) JWT::JWK::RSA.create_rsa_key_using_sets when only e, n, d, p and q are given raises an error telling all the exponents are required # OpenSSL 3.0 does not allow mutating objects anymore # ./spec/jwt/jwk/rsa_spec.rb:209 3) JWT::JWK::RSA.create_rsa_key_using_sets when e, n, d is given creates a valid RSA object representing a private key # OpenSSL 3.0 does not allow mutating objects anymore # ./spec/jwt/jwk/rsa_spec.rb:232 4) JWT::JWK::RSA.create_rsa_key_using_sets when e, n, d is given can be used for signing and verification # OpenSSL 3.0 does not allow mutating objects anymore # ./spec/jwt/jwk/rsa_spec.rb:241 5) JWT::JWK::RSA.create_rsa_key_using_sets when e, n, d is given can be used for encryption and decryption # OpenSSL 3.0 does not allow mutating objects anymore # ./spec/jwt/jwk/rsa_spec.rb:237 6) JWT::JWK::RSA.create_rsa_key_using_sets when public parameters (e, n) are given creates a valid RSA object representing a public key # OpenSSL 3.0 does not allow mutating objects anymore # ./spec/jwt/jwk/rsa_spec.rb:200 7) JWT::JWK::RSA.create_rsa_key_using_accessors when all key components n, e, d, p, q, dp, dq, qi are given creates a valid RSA object representing a public key # OpenSSL if RSA#d= is not available there is no accessors anymore # ./spec/jwt/jwk/rsa_spec.rb:217 8) JWT::JWK::RSA.create_rsa_key_using_accessors when only e, n, d, p and q are given raises an error telling all the exponents are required # OpenSSL if RSA#d= is not available there is no accessors anymore # ./spec/jwt/jwk/rsa_spec.rb:209 9) JWT::JWK::RSA.create_rsa_key_using_accessors when public parameters (e, n) are given creates a valid RSA object representing a public key # OpenSSL if RSA#d= is not available there is no accessors anymore # ./spec/jwt/jwk/rsa_spec.rb:200 10) JWT::JWK::RSA.create_rsa_key_using_accessors when e, n, d is given can be used for encryption and decryption # OpenSSL if RSA#d= is not available there is no accessors anymore # ./spec/jwt/jwk/rsa_spec.rb:237 11) JWT::JWK::RSA.create_rsa_key_using_accessors when e, n, d is given creates a valid RSA object representing a private key # OpenSSL if RSA#d= is not available there is no accessors anymore # ./spec/jwt/jwk/rsa_spec.rb:232 12) JWT::JWK::RSA.create_rsa_key_using_accessors when e, n, d is given can be used for signing and verification # OpenSSL if RSA#d= is not available there is no accessors anymore # ./spec/jwt/jwk/rsa_spec.rb:241 Finished in 3.14 seconds (files took 0.27866 seconds to load) 551 examples, 0 failures, 12 pending Randomized with seed 30800 /usr/bin/ruby3.4 /usr/bin/gem2deb-test-runner ┌──────────────────────────────────────────────────────────────────────────────┐ │ Checking Rubygems dependency resolution on ruby3.4 │ └──────────────────────────────────────────────────────────────────────────────┘ RUBYLIB=. GEM_PATH=/build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all:/build/reproducible-path/ruby-jwt-3.1.2/debian/.debhelper/generated/_source/home/.local/share/gem/ruby/3.4.0:/var/lib/gems/3.4.0:/usr/local/lib/ruby/gems/3.4.0:/usr/lib/ruby/gems/3.4.0:/usr/lib/x86_64-linux-gnu/ruby/gems/3.4.0:/usr/share/rubygems-integration/3.4.0:/usr/share/rubygems-integration/all:/usr/lib/x86_64-linux-gnu/rubygems-integration/3.4.0 ruby3.4 -e gem\ \"jwt\" ┌──────────────────────────────────────────────────────────────────────────────┐ │ Run tests for ruby3.4 from debian/ruby-tests.rake │ └──────────────────────────────────────────────────────────────────────────────┘ RUBYLIB=. GEM_PATH=/build/reproducible-path/ruby-jwt-3.1.2/debian/ruby-jwt/usr/share/rubygems-integration/all:/build/reproducible-path/ruby-jwt-3.1.2/debian/.debhelper/generated/_source/home/.local/share/gem/ruby/3.4.0:/var/lib/gems/3.4.0:/usr/local/lib/ruby/gems/3.4.0:/usr/lib/ruby/gems/3.4.0:/usr/lib/x86_64-linux-gnu/ruby/gems/3.4.0:/usr/share/rubygems-integration/3.4.0:/usr/share/rubygems-integration/all:/usr/lib/x86_64-linux-gnu/rubygems-integration/3.4.0 ruby3.4 -S rake --rakelibdir /gem2deb-nonexistent -f debian/ruby-tests.rake /usr/bin/ruby3.4 -I/usr/share/rubygems-integration/all/gems/rspec-support-3.13.1/lib:/usr/share/rubygems-integration/all/gems/rspec-core-3.13.0/lib /usr/share/rubygems-integration/all/gems/rspec-core-3.13.0/exe/rspec --pattern ./spec/\*\*/\*_spec.rb --format documentation Warning: Error occurred while trying to load /build/reproducible-path/ruby-jwt-3.1.2/.simplecov. Error message: cannot load such file -- simplecov_json_formatter OpenSSL::VERSION: 3.3.0 OpenSSL::OPENSSL_VERSION: OpenSSL 3.5.1 1 Jul 2025 OpenSSL::OPENSSL_LIBRARY_VERSION: OpenSSL 3.5.4 30 Sep 2025 Run options: include {focus: true} All examples were filtered out; ignoring {focus: true} Randomized with seed 6394 JWT::Claims::Crit when header is not an array raises JWT::InvalidCritError when header is an array containing exactly the expected values does not raise an error when header is an array and not containing the expected value raises an InvalidCritError when header is an array containing at least the expected values does not raise an error when header is missing raises JWT::InvalidCritError JWT::EncodedToken #valid? when claims are invalid returns false when key is valid returns true when key is invalid returns false when claims are provided as an array returns true #payload when token is verified using #verify_signature! and #verify_claims! is expected to eq {"pay" => "load"} when token is verified using #valid_signature? but is not valid raises an error when token is not verified raises an error when token is verified using #verify_signature! raises an error when token is verified using #valid? is expected to eq {"pay" => "load"} when token is checked using #valid_signature? and #valid_claims? is expected to eq {"pay" => "load"} #valid_claims? exp claim when claim validation skips verifying the exp claim returns true when no claims are provided validates the exp claim and returns false when claim is valid returns true when claim is invalid returns true #header is expected to eq {"alg" => "HS256"} when token is the empty string raises decode error #verify! when key is valid does not raise when key is invalid raises an error when claims are invalid raises an error #unverified_payload is expected to eq {"pay" => "load"} when payload is detached when payload is not provided raises decode error when payload provided in separate is expected to eq {"pay" => "load"} when payload is not encoded and the b64 crit is enabled handles the payload encoding when token is the empty string raises decode error #verify_signature! when RSA JWK is given as a key with algorithms supported by key provided uses the JWK for verification with algorithms not supported by key provided raises JWT::VerificationError with empty algorithm array provided uses the JWK for verification when payload is not encoded does not raise when key is invalid raises an error when neither key or key_finder is given raises an ArgumentError when key is an array with one valid entry does not raise when both key or key_finder is given raises an ArgumentError when header has invalid alg value does not raise when payload is detached when payload provided in separate does not raise when payload is not provided raises VerificationError when algorithm is not given raises an error when algorithm is an empty array raises an error when JWT::KeyFinder is used as a key_finder uses the keys provided by the JWK key finder when key_finder is given uses key provided by keyfinder can utilize an array provided by keyfinder when key is valid does not raise #claim_errors exp claim when claim is valid returns empty array when claim is invalid returns array with error objects integration use-cases simple verify HS256 with defaults protects the user from unverified payload access #verify_claims! when header contains crits header when expected crits are present passes verification when expected crits are missing raises an error exp claim verifies the exp when claims given as a list of symbols validates the claim when claims given as symbol validates the claim when claim validation skips verifying the exp claim does not raise when payload is detached when payload provided in separate raises claim verification error when payload is not provided raises decode error when no claims are provided raises ExpiredSignature error when claims given as a list of symbols and hashes validates the claim when required_claims is passed raises error #signing_input is expected to eq "eyJhbGciOiJIUzI1NiJ9.eyJwYXkiOiJsb2FkIn0" #signature is expected to be a kind of String JWT::JWA::Rsa #sign with an invalid key raises an error with a key length less than 2048 bits raises an error with a valid RSA key signs the data #initialize initializes with the correct algorithm and digest #verify with an invalid key returns false with a valid RSA key returns true with an invalid signature returns false JWT::Claims::Required when payload is missing the required claim raises JWT::MissingRequiredClaim when payload has the required claims passes validation JWT::X5cKeyFinder returns the public key from a certificate that is signed by trusted roots and not revoked certificate could not be chained to a trusted root certificate given nil raises a decode error given an array raises a verification error signature could not be verified with the given trusted roots raises an error revoked raises an error expired raises an error ::JWT.decode returns the encoded payload after successful certificate path verification CRL signature could not be verified with the given trusted roots raises an error expired raises an error not given raises an error already parsed certificates returns the public key from a certificate that is signed by trusted roots and not revoked JWT::JWK::Thumbprint #to_s when HMAC key is given is expected to eq "wPf4ZF5qlzoFxsGkft4eu1iWcehgAcahZL4XPV4dT-s" when example from RFC is given is expected to eq "NzbLsXh8uDCcd-6MNwXF4W_7noWXFZAfHkxZsRGC9Xs" when EC key is given is expected to eq "dO52_we59sdR49HsGCpVzlDUQNvT3KxCTGakk4Un8qc" JWT VERSION constants has a STRING version has a TINY version has a MINOR version has a PRE version has a MAJOR version .gem_version returns the gem version JWT::JWK::RSA #verify when the jwk has an invalid alg header raises JWT::VerificationError when the jwk has none as the alg parameter raises JWT::JWKError when the jwk is missing the alg header raises JWT::JWKError when the jwk has HS256 as the alg parameter raises JWT::DecodeError when the signature is valid returns true when the signature is invalid returns false .new when a keypair with both keys given creates an instance of the class when a keypair with only public key is given creates an instance of the class .create_rsa_key_using_accessors when only e, n, d, p and q are given raises an error telling all the exponents are required (PENDING: OpenSSL if RSA#d= is not available there is no accessors anymore) when e, n, d is given can be used for encryption and decryption (PENDING: OpenSSL if RSA#d= is not available there is no accessors anymore) can be used for signing and verification (PENDING: OpenSSL if RSA#d= is not available there is no accessors anymore) creates a valid RSA object representing a private key (PENDING: OpenSSL if RSA#d= is not available there is no accessors anymore) when all key components n, e, d, p, q, dp, dq, qi are given creates a valid RSA object representing a public key (PENDING: OpenSSL if RSA#d= is not available there is no accessors anymore) when public parameters (e, n) are given creates a valid RSA object representing a public key (PENDING: OpenSSL if RSA#d= is not available there is no accessors anymore) #keypair warns to stderr .create_rsa_key_using_sets when only e, n, d, p and q are given raises an error telling all the exponents are required (PENDING: OpenSSL 3.0 does not allow mutating objects anymore) when all key components n, e, d, p, q, dp, dq, qi are given creates a valid RSA object representing a public key (PENDING: OpenSSL 3.0 does not allow mutating objects anymore) when public parameters (e, n) are given creates a valid RSA object representing a public key (PENDING: OpenSSL 3.0 does not allow mutating objects anymore) when e, n, d is given can be used for encryption and decryption (PENDING: OpenSSL 3.0 does not allow mutating objects anymore) creates a valid RSA object representing a private key (PENDING: OpenSSL 3.0 does not allow mutating objects anymore) can be used for signing and verification (PENDING: OpenSSL 3.0 does not allow mutating objects anymore) #export when keypair with public key is exported returns a hash with the public parts of the key when keypair with private key is exported returns a hash with the public parts of the key when private key is requested returns a hash with the public AND private parts of the key when unsupported keypair is given raises an error .create_rsa_key_using_der when e, n, d is given expects all CRT parameters given and raises error when public parameters (e, n) are given creates a valid RSA object representing a public key when all key components n, e, d, p, q, dp, dq, qi are given creates a valid RSA object representing a public key when only e, n, d, p and q are given raises an error telling all the exponents are required .common_parameters when a common parameters hash is given converts string keys to symbol keys imports the common parameter .import when keypair is imported with string keys from JSON returns a hash with the public parts of the key when keypair is imported with symbol keys returns a hash with the public parts of the key when private key is included in the data creates a complete keypair when jwk_data is given without e and/or n raises an error .kid when configuration says to use :rfc7638_thumbprint generates the kid based on the thumbprint when kid is given in a hash parameter uses the given kid when kid is given as a String parameter uses the given kid JWT::JWA::Unsupported .verify raises an error for unsupported algorithm .sign raises an error for unsupported signing method JWT should encode string payloads should not verify token even if the payload has claims should not raise InvalidPayload exception if payload is an array when none token is decoded with a key given decodes the token a token with not enough segments raises JWT::DecodeError when keyfinder given with 3 arguments decodes the token but does not pass the payload when none token is decoded without verify decodes the token when keyfinder given with 2 arguments decodes the token alg: PS256 wrong key and verify = false should not raise JWT::DecodeError wrong key should raise JWT::DecodeError should generate a valid token should decode a valid token a token with two segments but does not require verifying raises something else than "Not enough or too many segments" when the alg is invalid raises JWT::IncorrectAlgorithm error when keyfinder given with 1 argument decodes the token alg: HS384 wrong secret and verify = false should not raise JWT::DecodeError should decode a valid token wrong secret should raise JWT::DecodeError should generate a valid token Verify claim verification order when two claims are invalid depends on the order of the parameters what error is raised when key given as an array with multiple possible keys should be able to verify signature when multiple keys given as a parameter should fail if only invalid keys are given should be able to verify signature when block returns multiple keys algorithm should raise JWT::IncorrectAlgorithm when algorithms array does not contain algorithm should raise JWT::IncorrectAlgorithm on mismatch prior to kid public key network call raises error when keyfinder does not find anything should raise JWT::IncorrectAlgorithm on mismatch token is missing algorithm should raise JWT::IncorrectAlgorithm invalid header format should raise JWT::DecodeError 2-segment token should raise JWT::IncorrectAlgorithm no algorithm provided should use the default decode algorithm when encoded payload is used to extract key through find_key should be able to find a key using the block passed to decode with iss verification should be able to find a key using the block passed to decode should be able to verify signature when block returns multiple keys should be able to find a key using a block with multiple issuers should be able to verify signature when block returns multiple keys with iss verification should be able to verify signature when block returns multiple keys with multiple issuers issuer claim if verify_iss is set to false (default option) should not raise JWT::InvalidIssuerError when verify_iss is set to true and no issues given does not raise audience claim when verify_aud is set to true and no audience given does not raise alg: ES512 wrong key should raise JWT::DecodeError should generate a valid token should decode a valid token wrong key and verify = false should not raise JWT::DecodeError when token is missing the alg header raises JWT::IncorrectAlgorithm error when keyfinder resolves to multiple keys and multiple algorithms given with issue with ES256 keys tries until the first match tries until the first match with issue with HS256 keys tries until the first match when none token is and decoding without key and with verification decodes the token when hmac algorithm is used without secret key encodes payload alg: HS512 should decode a valid token wrong secret and verify = false should not raise JWT::DecodeError wrong secret should raise JWT::DecodeError should generate a valid token a token with not too many segments raises JWT::DecodeError algorithm case insensitivity ignores algorithm casing during encode/decode raises error for invalid algorithm alg: PS384 should generate a valid token wrong key and verify = false should not raise JWT::DecodeError should decode a valid token wrong key should raise JWT::DecodeError alg: ES256 wrong key should raise JWT::DecodeError should decode a valid token wrong key and verify = false should not raise JWT::DecodeError should generate a valid token when token signed with nil and decoded with nil raises JWT::DecodeError ::JWT.decode with verify_iat parameter when iat is 1 second before Time.now raises an error when iat is exactly the same as Time.now and iat is given as floored integer considers iat valid when iat is exactly the same as Time.now and iat is given as a float considers iat valid when token ends with a newline char and strict_decoding enabled raises JWT::DecodeError alg: RS512 should decode a valid token using algorithm hash string key wrong key should raise JWT::DecodeError should decode a valid token should generate a valid token wrong key and verify = false should not raise JWT::DecodeError Invalid raises "No verification key available" error algorithm should raise DecodeError ECDSA curve_name should raise JWT::IncorrectAlgorithm when multiple algorithms given starts trying with the algorithm referred in the header a token with no segments raises JWT::DecodeError when token has null as the alg header raises JWT::IncorrectAlgorithm error ::JWT.decode with x5c parameter calls X5cKeyFinder#from to verify the signature and return the payload alg: NONE should generate a valid token decoding with verification specifying the none algorithm when the claims are invalid should fail to decode the token when the claims are valid should decode the token without specifying the none algorithm should fail to decode the token decoding without verification should decode a valid token alg: HS256 wrong secret and verify = false should not raise JWT::DecodeError should generate a valid token should decode a valid token wrong secret should raise JWT::DecodeError when algorithm is a custom class can be used for encoding can be used for decoding when #sign method is missing raises an error on encoding allows decoding when multiple custom algorithms are given for decoding tries until the first match when #verify method is missing raises error on decoding can be used for encoding when class is not utilizing the ::JWT::JWA::SigningAlgorithm module raises an error when signature is not matching fails the validation process when alg is not matching fails the validation process when class has custom header method uses the provided header when token ends with a newline char raises an error a token with invalid Base64 segments raises JWT::Base64DecodeError alg: ES256K wrong key and verify = false should not raise JWT::DecodeError should generate a valid token should decode a valid token wrong key should raise JWT::DecodeError alg: ES384 should decode a valid token wrong key should raise JWT::DecodeError should generate a valid token wrong key and verify = false should not raise JWT::DecodeError alg: PS512 wrong key and verify = false should not raise JWT::DecodeError should generate a valid token should decode a valid token wrong key should raise JWT::DecodeError alg: RS256 should decode a valid token should generate a valid token should decode a valid token using algorithm hash string key wrong key should raise JWT::DecodeError wrong key and verify = false should not raise JWT::DecodeError alg: RS384 wrong key should raise JWT::DecodeError should decode a valid token using algorithm hash string key should decode a valid token should generate a valid token wrong key and verify = false should not raise JWT::DecodeError when the alg value is given as a header parameter overrides the actual algorithm used should generate the same token JWT::JWA::Ecdsa #sign when the signing key is not an OpenSSL::PKey::EC instance raises a JWT::DecodeError when the signing key is invalid raises a JWT::DecodeError when the signing key is a public key raises a JWT::DecodeError when the signing key is valid returns a valid signature #verify when the verification key is not an OpenSSL::PKey::EC instance raises a JWT::DecodeError when verification results in a OpenSSL::PKey::PKeyError error raises a JWT::VerificationError when the verification key is valid returns true for a valid signature returns false for an invalid signature when the verification key is a point verifies the signature .curve_by_name when secp256r1 is given is expected to eq {:algorithm => "ES256", :digest => "sha256"} when prime256v1 is given is expected to eq {:algorithm => "ES256", :digest => "sha256"} when secp256k1 is given is expected to eq {:algorithm => "ES256K", :digest => "sha256"} when secp521r1 is given is expected to eq {:algorithm => "ES512", :digest => "sha512"} when unknown is given raises an error JWT JWT.configure yields the configuration allows configuration to be changed via the block JWT::Claims .payload_errors various types of params when payload is most of the claims raises an error exp claim when claim is invalid returns array with error objects when claim is valid returns empty array .valid_payload? exp claim when claim is valid returns true when claim is invalid returns false various types of params when payload is missing most of the claims raises an error when payload has everything that is expected of it does not raise .verify_payload! when required_claims is passed raises error exp claim verifies the exp when claims given as a list of symbols and hashes validates the claim when claims given as symbol validates the claim when claims given as a list of symbols validates the claim JWT::Claims::NotBefore #verify! when nbf is in the future raises JWT::ImmatureSignature when nbf is in the past does not raise error when leeway is given does not raise error JWT::Claims::IssuedAt when iat is now as a integer passes validation when iat is not a number fails validation when iat is now passes validation when iat is in the future fails validation when payload is a string containing iat passes validation JWT::JWA::Ps #sign with a key length less than 2048 bits raises an error with a valid RSA key signs the data with PS512 signs the data with PS256 signs the data with PS384 with an invalid key raises an error #verify with an invalid signature raises a verification error when verification results in a OpenSSL::PKey::PKeyError error raises a JWT::VerificationError with a valid RSA key verifies the signature with PS512 verifies the signature with PS256 verifies the signature with PS384 #initialize initializes with the correct algorithm and digest README.md code test algorithm usage RSASSA-PSS NONE ECDSA decodes with HMAC algorithm with secret key RSA decodes with HMAC algorithm without secret key custom algorithm example allows a module to be used as algorithm on encode and decode claims jti required_claims sub iss JWK with thumbprint given in the initializer (legacy) JWK import and export JWK with thumbprint as kid via symbol JWK with thumbprint given in the initializer JWK with thumbprint as kid via type find_key custom header fields with custom field aud string array nbf with leeway without leeway The JWK based encode/decode routine works as expected iat with leeway without leeway exp without leeway with leeway The JWKS loader example works as expected (legacy) works as expected JWK to verify a signature allows to verify a signature with a JWK JWT::Claims::Expiration when token is not a Hash passes validation when token is expired must raise JWT::ExpiredSignature when the token has expired when token exp is set to current time fails validation when token is expired but some leeway is defined passes validation JWT::JWA::Ecdsa used across threads for encoding and decoding successfully encodes, decodes, and verifies JWT::Token #claim_errors exp claim when claim is valid returns empty array when claim is invalid returns array with error objects #valid_claims? exp claim when claim is valid returns true when claim is invalid returns true #jwt when token is signed returns a signed and encoded token when token is not signed returns a signed and encoded token when alg is given in header returns a signed and encoded token when EC JWK is given as key signs the token #sign! signs the token when RSA JWK is given as key signs the token with mismatching algorithm provided in sign call signs the token with algorithm provided in sign call signs the token when signed twice raises when string key is given but not algorithm raises an error #detach_payload! before token is signed detaches the payload #verify_claims! when required_claims is passed raises error JWT::Claims::JwtId when payload contains a jti passes validation when payload is missing a jti raises JWT::InvalidJtiError when payload contains a jti that is a blank string raises JWT::InvalidJtiError when jti validator is a proc returning true passes validation when jti validator is a proc returning false raises JWT::InvalidJtiError when payload contains a jti that is an empty string raises JWT::InvalidJtiError when jti validator has 2 args passes validation when jti validator has 2 args the second arg is the payload JWT::Claims::Verifier .verify! when all claims are given verifies all claims JWT::JWK .new when EC key is given is expected to be a kind of JWT::JWK::EC when RSA key is given is expected to be a kind of JWT::JWK::RSA when a common parameter is given sets the common parameter when secret key is given is expected to be a kind of JWT::JWK::HMAC when kid is given sets the kid .[] allows to read common parameters via the key-accessor rejects key parameters as keys via the key-accessor allows to set common parameters via the key-accessor .import creates a ::JWT::JWK::RSA instance when keytype is not supported raises an error when number is given raises an error when a common JWK parameter is specified returns the defined common JWK parameter parsed from JSON creates a ::JWT::JWK::RSA instance from JSON parsed JWK when keypair with defined kid is imported returns the predefined kid if jwt_data contains a kid JWT::JWK::EC #public_key returns the key #keypair returns the key #verify when the jwk has an invalid alg header raises JWT::VerificationError when jwk is missing the alg parameter when the signature is valid returns true when jwk has alg parameter when the signature is invalid returns false when the signature is valid returns true when the jwk has none as the alg parameter raises JWT::JWKError when the jwk has HS256 as the alg parameter raises JWT::DecodeError .import when crv=P-256 when keypair is private returns a private key with a custom "kid" value imports that "kid" value when keypair is public returns a public key returns a hash with the public parts of the key when crv=P-521 when keypair is private returns a private key with a custom "kid" value imports that "kid" value when keypair is public returns a public key returns a hash with the public parts of the key with missing 0-byte at the start of EC coordinates prepends a 0-byte to either X or Y coordinate so that the keys decode correctly when crv=P-256K when keypair is public returns a public key returns a hash with the public parts of the key when keypair is private returns a private key with a custom "kid" value imports that "kid" value when crv=P-384 when keypair is private returns a private key with a custom "kid" value imports that "kid" value when keypair is public returns a public key returns a hash with the public parts of the key with missing 0-byte at the start of EC coordinates prepends a 0-byte to either X or Y coordinate so that the keys decode correctly with missing 0-byte at the start of EC coordinates prepends a 0-byte to either X or Y coordinate so that the keys decode correctly with missing 0-byte at the start of EC coordinates prepends a 0-byte to either X or Y coordinate so that the keys decode correctly #export when keypair with private key is exported returns a hash with the both parts of the key when private key is requested returns a hash with the both parts of the key when a common parameter is given returns a hash including the common parameter when keypair with public key is exported returns a hash with the public parts of the key when a custom "kid" is provided exports it .to_openssl_curve when an invalid curve name is given raises an error when a valid curve name is given returns the corresponding OpenSSL curve name .new when EC with unsupported curve is given raises an error when a number is given raises an argument error when a keypair with both keys given creates an instance of the class when a keypair with only public key is given creates an instance of the class JWT::JWK::Set .select! filters the keyset .merge merges two JWKSs when called via .union when called via "|" operator when called directly .new can create an empty set raises an error on invalid inputs can create a set from a JWKS hash with symbol keys from an array of keys from an existing JWT::JWK::Set from a JWK from a JWKS hash with string keys .reject! filters the keyset .eql? correctly classifies different sets correctly classifies equal sets .uniq! filters out equal keys .export exports the JWKS to Hash JWT::JWA::Hmac #sign when nil hmac_secret is passed when other versions of openssl do not raise an exception is expected to eql "C\xB0\xCE\xF9\x92e\xF9\xE3L\x10\xEA\x9D5\x01\x92m'\xB3\x9FW\xC6\xD6tV\x1D\x8B\xA26\xE7\xA8\x19\xFB" when OpenSSL 3.0 raises a malloc failure raises JWT::DecodeError when OpenSSL raises any other error raises the original error when hmac_secret is passed when OpenSSL raises any other error raises the original error when OpenSSL 3.0 raises a malloc failure raises the original error when other versions of openssl do not raise an exception is expected to eql "\x88\xCD!\b\xB54}\x97<\xF3\x9C\xDF\x90S\xD7\xDDBpHv\xD8\xC9\xA9\xBD\x8E-\x16\x82Y\xD3\xDD\xF7" when blank hmac_secret is passed when other versions of openssl do not raise an exception is expected to eql "C\xB0\xCE\xF9\x92e\xF9\xE3L\x10\xEA\x9D5\x01\x92m'\xB3\x9FW\xC6\xD6tV\x1D\x8B\xA26\xE7\xA8\x19\xFB" when OpenSSL raises any other error raises the original error when OpenSSL 3.0 raises a malloc failure raises JWT::DecodeError when signing with a key is expected to eq "<8WH\xB9\xC2\x96\r\x12\x94L\xF5^[\xC9@o[\xA7\x9C+\x94)q\xA8\x9C\x89\f\v\x1F:a" #verify when signature is valid is expected to equal true when signature is invalid is expected to equal false JWT .decode for JWK usecase when JWK features are used manually is able to decode the token when jwk keys are rotated decodes the token when jwk keys are loaded from JSON with string keys decodes the token when jwk keys are given as an array token does not know the kid raises an exception no keys are found in the set raises an exception and x5t is in the set is able to decode the token and both kid and x5t is in the set is able to decode the token based on the priority of the key defined in key_fields and kid is not in the set raises an exception and kid is in the set is able to decode the token mixing algorithms using kid header when RSA key is pointed to as HMAC secret raises JWT::DecodeError when ES384 key is pointed to as ES512 key fails in some way when EC key is pointed to as HMAC secret raises JWT::DecodeError when HMAC secret is pointed to as EC public key fails in some way when HMAC secret is pointed to as RSA public key fails in some way when EC key is pointed to as RSA public key fails in some way when the token kid is nil and allow_nil_kid is specified decodes the token when the token kid is not a string raises an exception when jwk keys are loaded using a proc/lambda decodes the token JWT::JWA::None #sign returns an empty string #verify returns true JWT::Claims::Audience #verify! when an array with any value matching all in the options passes validation when a singular audience payload matching any value in the options array passes validation when an array with any value matching the one in the options passes validation when any value in payload matches a single expected passes validation when the payload has an array and none match the supplied value raises JWT::InvalidAudError when the singular audience does not match raises JWT::InvalidAudError when single audience is required passes validation JWT::Claims::Numeric use via ::JWT::Claims.verify_payload! nbf claim it should behave like a NumericDate claim when nbf payload is a Time object raises error when nbf payload is a float does not raise error when nbf payload is an integer does not raise error and key is a string does not raise error when nbf payload is a string raises error when nbf payload is a string raises error and key is a string raises error exp claim it should behave like a NumericDate claim when exp payload is a string raises error and key is a string raises error when exp payload is a Time object raises error when exp payload is a string raises error when exp payload is an integer does not raise error and key is a string does not raise error when exp payload is a float does not raise error iat claim it should behave like a NumericDate claim when iat payload is a float does not raise error when iat payload is a string raises error when iat payload is a Time object raises error when iat payload is an integer does not raise error and key is a string does not raise error when iat payload is a string raises error and key is a string raises error #verify! exp claim it should behave like a NumericDate claim when exp payload is a string raises error and key is a string raises error when exp payload is a float does not raise error when exp payload is an integer does not raise error and key is a string does not raise error when exp payload is a Time object raises error when exp payload is a string raises error iat claim it should behave like a NumericDate claim when iat payload is a Time object raises error when iat payload is a string raises error and key is a string raises error when iat payload is a string raises error when iat payload is a float does not raise error when iat payload is an integer does not raise error and key is a string does not raise error nbf claim it should behave like a NumericDate claim when nbf payload is a float does not raise error when nbf payload is an integer does not raise error and key is a string does not raise error when nbf payload is a string raises error and key is a string raises error when nbf payload is a Time object raises error when nbf payload is a string raises error JWT::Configuration::JwkConfiguration .kid_generator_type= when valid value is passed sets the generator matching the value when invalid value is passed raises ArgumentError JWT::JWK::HMAC #== is not equal to a different key is not equal to a non-key is equal to itself is not equal to nil is equal to a clone of itself is not equal to boolean true #<=> is not equal to a different key is equal to itself is equal to a clone of itself is not comparable to boolean true is not comparable to nil is not comparable to a non-key #[]= when k is given raises an error .new when a secret key given creates an instance of the class when key is a number raises an ArgumentError #keypair returns a string .import when secret key is given returns a key with a custom "kid" value imports that "kid" value with a common parameter imports that common parameter when example from RFC decodes the k #export when key is exported returns a hash with the key when key is exported with private key returns a hash with the key JWT::JWA .resolve_and_sort when algorithms have the preferred in the middle places the preferred algorithm first when algorithms have the preferred last places the preferred algorithm first JWT::Claims::Issuer when issuer is given as a Proc passes validation when expected issuer is an array and payload does not have any issuer raises JWT::InvalidIssuerError when expected issuer is an array that does not match the payload raises JWT::InvalidIssuerError when issuer is given as a RegExp and does not match the payload raises JWT::InvalidIssuerError when expected issuer is a string that matches the payload passes validation when issuer is given as a Method instance passes validation when payload does not contain any issuer raises JWT::InvalidIssuerError when issuer is given as a RegExp passes validation when expected issuer is an array that matches the payload passes validation when issuer is given as a RegExp and payload does not have any issuer raises JWT::InvalidIssuerError when expected issuer is a string that does not match the payload raises JWT::InvalidIssuerError when issuer is given as a Proc and does not match the payload raises JWT::InvalidIssuerError when issuer is given as a Proc and payload does not have any issuer raises JWT::InvalidIssuerError Pending: (Failures listed here are expected and do not affect your suite's status) 1) JWT::JWK::RSA.create_rsa_key_using_accessors when only e, n, d, p and q are given raises an error telling all the exponents are required # OpenSSL if RSA#d= is not available there is no accessors anymore # ./spec/jwt/jwk/rsa_spec.rb:209 2) JWT::JWK::RSA.create_rsa_key_using_accessors when e, n, d is given can be used for encryption and decryption # OpenSSL if RSA#d= is not available there is no accessors anymore # ./spec/jwt/jwk/rsa_spec.rb:237 3) JWT::JWK::RSA.create_rsa_key_using_accessors when e, n, d is given can be used for signing and verification # OpenSSL if RSA#d= is not available there is no accessors anymore # ./spec/jwt/jwk/rsa_spec.rb:241 4) JWT::JWK::RSA.create_rsa_key_using_accessors when e, n, d is given creates a valid RSA object representing a private key # OpenSSL if RSA#d= is not available there is no accessors anymore # ./spec/jwt/jwk/rsa_spec.rb:232 5) JWT::JWK::RSA.create_rsa_key_using_accessors when all key components n, e, d, p, q, dp, dq, qi are given creates a valid RSA object representing a public key # OpenSSL if RSA#d= is not available there is no accessors anymore # ./spec/jwt/jwk/rsa_spec.rb:217 6) JWT::JWK::RSA.create_rsa_key_using_accessors when public parameters (e, n) are given creates a valid RSA object representing a public key # OpenSSL if RSA#d= is not available there is no accessors anymore # ./spec/jwt/jwk/rsa_spec.rb:200 7) JWT::JWK::RSA.create_rsa_key_using_sets when only e, n, d, p and q are given raises an error telling all the exponents are required # OpenSSL 3.0 does not allow mutating objects anymore # ./spec/jwt/jwk/rsa_spec.rb:209 8) JWT::JWK::RSA.create_rsa_key_using_sets when all key components n, e, d, p, q, dp, dq, qi are given creates a valid RSA object representing a public key # OpenSSL 3.0 does not allow mutating objects anymore # ./spec/jwt/jwk/rsa_spec.rb:217 9) JWT::JWK::RSA.create_rsa_key_using_sets when public parameters (e, n) are given creates a valid RSA object representing a public key # OpenSSL 3.0 does not allow mutating objects anymore # ./spec/jwt/jwk/rsa_spec.rb:200 10) JWT::JWK::RSA.create_rsa_key_using_sets when e, n, d is given can be used for encryption and decryption # OpenSSL 3.0 does not allow mutating objects anymore # ./spec/jwt/jwk/rsa_spec.rb:237 11) JWT::JWK::RSA.create_rsa_key_using_sets when e, n, d is given creates a valid RSA object representing a private key # OpenSSL 3.0 does not allow mutating objects anymore # ./spec/jwt/jwk/rsa_spec.rb:232 12) JWT::JWK::RSA.create_rsa_key_using_sets when e, n, d is given can be used for signing and verification # OpenSSL 3.0 does not allow mutating objects anymore # ./spec/jwt/jwk/rsa_spec.rb:241 Finished in 3.54 seconds (files took 0.26943 seconds to load) 551 examples, 0 failures, 12 pending Randomized with seed 6394 ┌──────────────────────────────────────────────────────────────────────────────┐ │ dh_ruby --install finished │ └──────────────────────────────────────────────────────────────────────────────┘ dh_installdocs -O--buildsystem=ruby dh_ruby_fixdocs -O--buildsystem=ruby dh_installchangelogs -O--buildsystem=ruby dh_installsystemduser -O--buildsystem=ruby dh_perl -O--buildsystem=ruby dh_link -O--buildsystem=ruby dh_strip_nondeterminism -O--buildsystem=ruby dh_compress -X.rb -O--buildsystem=ruby dh_fixperms -O--buildsystem=ruby dh_missing -O--buildsystem=ruby dh_ruby_fixdepends -O--buildsystem=ruby dh_installdeb -O--buildsystem=ruby dh_gencontrol -O--buildsystem=ruby dpkg-gencontrol: warning: Depends field of package ruby-jwt: substitution variable ${shlibs:Depends} used, but is not defined dh_md5sums -O--buildsystem=ruby dh_builddeb -O--buildsystem=ruby dpkg-deb: building package 'ruby-jwt' in '../ruby-jwt_3.1.2-1+rebuild1766590433_all.deb'. dpkg-genbuildinfo --build=binary -O../ruby-jwt_3.1.2-1+rebuild1766590433_amd64.buildinfo dpkg-genchanges --build=binary -mAutomated rebuild -O../ruby-jwt_3.1.2-1+rebuild1766590433_amd64.changes dpkg-genchanges: info: binary-only upload (no source code included) dpkg-source --after-build . dpkg-buildpackage: info: binary-only upload (no source included) -------------------------------------------------------------------------------- Build finished at 2025-12-24T15:34:36Z Finished -------- I: Built successfully +------------------------------------------------------------------------------+ | Changes Wed, 24 Dec 2025 15:34:37 +0000 | +------------------------------------------------------------------------------+ ruby-jwt_3.1.2-1+rebuild1766590433_amd64.changes: ------------------------------------------------- Format: 1.8 Date: Wed, 24 Dec 2025 15:33:53 +0000 Source: ruby-jwt Binary: ruby-jwt Architecture: all Version: 3.1.2-1+rebuild1766590433 Distribution: unstable Urgency: medium Maintainer: Automated rebuild Changed-By: mass-rebuild Description: ruby-jwt - JSON Web Token implementation in Ruby Changes: ruby-jwt (3.1.2-1+rebuild1766590433) UNRELEASED; urgency=medium . * Rebuild with mass-rebuild Checksums-Sha1: 10b947cf961f6346fb7ea8eacd7eecc65f9895d9 47380 ruby-jwt_3.1.2-1+rebuild1766590433_all.deb 8d74f01184f865466c32e38ac28d5f6dd2437f6f 6027 ruby-jwt_3.1.2-1+rebuild1766590433_amd64.buildinfo Checksums-Sha256: 0cd25ad684697393bd775e2eb514e319b3c5893245a4d38998374265894244b3 47380 ruby-jwt_3.1.2-1+rebuild1766590433_all.deb 888ccdd0540b5a3e65190bb50913fe75cd988cd8a6a55661ebae3bf56dd79f91 6027 ruby-jwt_3.1.2-1+rebuild1766590433_amd64.buildinfo Files: e29f193345cc3dd1ba3f32df65d45db0 47380 ruby optional ruby-jwt_3.1.2-1+rebuild1766590433_all.deb 9681606d7ffd283ce4201d84402f3431 6027 ruby optional ruby-jwt_3.1.2-1+rebuild1766590433_amd64.buildinfo +------------------------------------------------------------------------------+ | Buildinfo Wed, 24 Dec 2025 15:34:37 +0000 | +------------------------------------------------------------------------------+ Format: 1.0 Source: ruby-jwt Binary: ruby-jwt Architecture: all Version: 3.1.2-1+rebuild1766590433 Checksums-Md5: e29f193345cc3dd1ba3f32df65d45db0 47380 ruby-jwt_3.1.2-1+rebuild1766590433_all.deb Checksums-Sha1: 10b947cf961f6346fb7ea8eacd7eecc65f9895d9 47380 ruby-jwt_3.1.2-1+rebuild1766590433_all.deb Checksums-Sha256: 0cd25ad684697393bd775e2eb514e319b3c5893245a4d38998374265894244b3 47380 ruby-jwt_3.1.2-1+rebuild1766590433_all.deb Build-Origin: Debian Build-Architecture: amd64 Build-Date: Wed, 24 Dec 2025 15:34:36 +0000 Build-Path: /build/reproducible-path/ruby-jwt-3.1.2 Installed-Build-Depends: autoconf (= 2.72-3.1), automake (= 1:1.18.1-3), autopoint (= 0.23.2-1), autotools-dev (= 20240727.1), base-files (= 14), base-passwd (= 3.6.8), bash (= 5.3-1), binutils (= 2.45.50.20251209-1), binutils-common (= 2.45.50.20251209-1), binutils-x86-64-linux-gnu (= 2.45.50.20251209-1), bsdextrautils (= 2.41.3-2), build-essential (= 12.12), bzip2 (= 1.0.8-6), ca-certificates (= 20250419), coreutils (= 9.7-3), cpp (= 4:15.2.0-4), cpp-15 (= 15.2.0-12), cpp-15-x86-64-linux-gnu (= 15.2.0-12), cpp-x86-64-linux-gnu (= 4:15.2.0-4), dash (= 0.5.12-12), debconf (= 1.5.91), debhelper (= 13.29), debianutils (= 5.23.2), dh-autoreconf (= 21), dh-strip-nondeterminism (= 1.15.0-1), diffutils (= 1:3.12-1), dpkg (= 1.23.3), dpkg-dev (= 1.23.3), dwz (= 0.16-2), file (= 1:5.46-5), findutils (= 4.10.0-3), g++ (= 4:15.2.0-4), g++-15 (= 15.2.0-12), g++-15-x86-64-linux-gnu (= 15.2.0-12), g++-x86-64-linux-gnu (= 4:15.2.0-4), gcc (= 4:15.2.0-4), gcc-15 (= 15.2.0-12), gcc-15-base (= 15.2.0-12), gcc-15-x86-64-linux-gnu (= 15.2.0-12), gcc-x86-64-linux-gnu (= 4:15.2.0-4), gem2deb (= 2.2.6), gem2deb-test-runner (= 2.2.6), gettext (= 0.23.2-1), gettext-base (= 0.23.2-1), grep (= 3.12-1), groff-base (= 1.23.0-10), gzip (= 1.13-1), hostname (= 3.25), init-system-helpers (= 1.69), intltool-debian (= 0.35.0+20060710.6), libacl1 (= 2.3.2-2+b1), libarchive-zip-perl (= 1.68-1), libasan8 (= 15.2.0-12), libatomic1 (= 15.2.0-12), libattr1 (= 1:2.5.2-3), libaudit-common (= 1:4.1.2-1), libaudit1 (= 1:4.1.2-1+b1), libbinutils (= 2.45.50.20251209-1), libblkid1 (= 2.41.3-2), libbz2-1.0 (= 1.0.8-6), libc-bin (= 2.42-6), libc-dev-bin (= 2.42-6), libc-gconv-modules-extra (= 2.42-6), libc6 (= 2.42-6), libc6-dev (= 2.42-6), libcap-ng0 (= 0.8.5-4+b2), libcap2 (= 1:2.75-10+b5), libcc1-0 (= 15.2.0-12), libcrypt-dev (= 1:4.5.1-1), libcrypt1 (= 1:4.5.1-1), libctf-nobfd0 (= 2.45.50.20251209-1), libctf0 (= 2.45.50.20251209-1), libdb5.3t64 (= 5.3.28+dfsg2-11), libdebconfclient0 (= 0.282+b2), libdebhelper-perl (= 13.29), libdpkg-perl (= 1.23.3), libelf1t64 (= 0.194-1), libffi8 (= 3.5.2-3), libfile-stripnondeterminism-perl (= 1.15.0-1), libgcc-15-dev (= 15.2.0-12), libgcc-s1 (= 15.2.0-12), libgdbm-compat4t64 (= 1.26-1), libgdbm6t64 (= 1.26-1), libgmp-dev (= 2:6.3.0+dfsg-5), libgmp10 (= 2:6.3.0+dfsg-5), libgmpxx4ldbl (= 2:6.3.0+dfsg-5), libgomp1 (= 15.2.0-12), libgprofng0 (= 2.45.50.20251209-1), libhwasan0 (= 15.2.0-12), libisl23 (= 0.27-1), libitm1 (= 15.2.0-12), libjansson4 (= 2.14-2+b4), libjs-jquery (= 3.7.1+dfsg+~3.5.33-1), libjs-jquery-easing (= 12-4), libjs-jquery-fancybox (= 12-4), libjs-jquery-mousewheel (= 1:3.1.13-5), libjs-jquery-ui (= 1.13.2+dfsg-1), liblsan0 (= 15.2.0-12), liblzma5 (= 5.8.1-2), libmagic-mgc (= 1:5.46-5), libmagic1t64 (= 1:5.46-5), libmd0 (= 1.1.0-2+b1), libmount1 (= 2.41.3-2), libmpc3 (= 1.3.1-2), libmpfr6 (= 4.2.2-2), libpam-modules (= 1.7.0-5), libpam-modules-bin (= 1.7.0-5), libpam-runtime (= 1.7.0-5), libpam0g (= 1.7.0-5), libpcre2-8-0 (= 10.46-1), libperl5.40 (= 5.40.1-7), libpipeline1 (= 1.5.8-2), libquadmath0 (= 15.2.0-12), libruby (= 1:3.3+b1), libruby3.3 (= 3.3.8-2), libruby3.4 (= 3.4.5-1~exp1), libseccomp2 (= 2.6.0-2+b1), libselinux1 (= 3.9-4+rebuild1766544377), libsframe2 (= 2.45.50.20251209-1), libsmartcols1 (= 2.41.3-2), libsodium23 (= 1.0.18-1+b2), libssl3t64 (= 3.5.4-1), libstdc++-15-dev (= 15.2.0-12), libstdc++6 (= 15.2.0-12), libsystemd0 (= 259-1), libtinfo6 (= 6.5+20251123-1), libtool (= 2.5.4-9), libtsan2 (= 15.2.0-12), libubsan1 (= 15.2.0-12), libuchardet0 (= 0.0.8-2), libudev1 (= 259-1), libunistring5 (= 1.3-2), libuuid1 (= 2.41.3-2), libxml2-16 (= 2.15.1+dfsg-2+b1), libyaml-0-2 (= 0.2.5-2+b1), libzstd1 (= 1.5.7+dfsg-2), linux-libc-dev (= 6.17.13-1), m4 (= 1.4.20-2), make (= 4.4.1-3), man-db (= 2.13.1-1), mawk (= 1.3.4.20250131-2), ncurses-base (= 6.5+20251123-1), ncurses-bin (= 6.5+20251123-1), openssl (= 3.5.4-1), openssl-provider-legacy (= 3.5.4-1), patch (= 2.8-2), perl (= 5.40.1-7), perl-base (= 5.40.1-7), perl-modules-5.40 (= 5.40.1-7), po-debconf (= 1.0.22), rake (= 13.2.1-1), rpcsvc-proto (= 1.4.3-1), ruby (= 1:3.3+b1), ruby-all-dev (= 1:3.3+support3.4~0), ruby-csv (= 3.3.4-1), ruby-did-you-mean (= 1.6.3-2), ruby-diff-lcs (= 1.6.2-1), ruby-docile (= 1.1.5-3), ruby-ffi (= 1.17.2+dfsg-1+rebuild1766547583), ruby-minitest (= 5.26.1-1), ruby-net-telnet (= 0.2.0-1), ruby-power-assert (= 2.0.5-1), ruby-rbnacl (= 7.1.1-1), ruby-rspec (= 3.13.0c0e0m0s1-2), ruby-rspec-core (= 3.13.0c0e0m0s1-2), ruby-rspec-expectations (= 3.13.0c0e0m0s1-2), ruby-rspec-mocks (= 3.13.0c0e0m0s1-2), ruby-rspec-support (= 3.13.0c0e0m0s1-2), ruby-ruby2-keywords (= 0.0.5-1), ruby-rubygems (= 3.6.7-2), ruby-simplecov (= 0.22.0-2), ruby-simplecov-html (= 0.12.3-2), ruby-test-unit (= 3.6.2-1), ruby-webrick (= 1.9.1-1), ruby-xmlrpc (= 0.3.3-2), ruby3.3 (= 3.3.8-2), ruby3.3-dev (= 3.3.8-2), ruby3.4 (= 3.4.5-1~exp1), ruby3.4-dev (= 3.4.5-1~exp1), rubygems-integration (= 1.19), sed (= 4.9-2), sensible-utils (= 0.0.26), sysvinit-utils (= 3.15-6), tar (= 1.35+dfsg-3.1), util-linux (= 2.41.3-2), xz-utils (= 5.8.1-2), zlib1g (= 1:1.3.dfsg+really1.3.1-1+b2) Environment: DEB_BUILD_OPTIONS="parallel=8" LANG="C.UTF-8" LC_COLLATE="C.UTF-8" LC_CTYPE="C.UTF-8" SOURCE_DATE_EPOCH="1766590433" +------------------------------------------------------------------------------+ | Package contents Wed, 24 Dec 2025 15:34:37 +0000 | +------------------------------------------------------------------------------+ ruby-jwt_3.1.2-1+rebuild1766590433_all.deb ------------------------------------------ new Debian package, version 2.0. size 47380 bytes: control archive=2176 bytes. 929 bytes, 20 lines control 5133 bytes, 49 lines md5sums Package: ruby-jwt Version: 3.1.2-1+rebuild1766590433 Architecture: all Maintainer: Debian Ruby Team Installed-Size: 157 Depends: ruby-base64 Breaks: ruby-googleauth (<< 0.6~), ruby-omniauth-azure-oauth2 (<< 0.0.10~) Section: ruby Priority: optional Homepage: https://github.com/jwt/ruby-jwt Description: JSON Web Token implementation in Ruby A JSON Web Token (JWT) is a compact token format intended for space constrained environments such as HTTP Authorization headers and URI query parameters, and used as a means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is digitally signed. . The JWT specification supports several algorithms for cryptographic signing. This library currently supports HMAC (HS256, HS384, HS512) and RSA (RS256, RS256, RS512). Unsigned plaintext JWT's are supported too. drwxr-xr-x root/root 0 2025-12-24 15:33 ./ drwxr-xr-x root/root 0 2025-12-24 15:33 ./usr/ drwxr-xr-x root/root 0 2025-12-24 15:33 ./usr/share/ drwxr-xr-x root/root 0 2025-12-24 15:33 ./usr/share/doc/ drwxr-xr-x root/root 0 2025-12-24 15:33 ./usr/share/doc/ruby-jwt/ -rw-r--r-- root/root 8978 2025-06-28 19:00 ./usr/share/doc/ruby-jwt/README.md.gz -rw-r--r-- root/root 1527 2025-12-24 15:33 ./usr/share/doc/ruby-jwt/changelog.Debian.gz -rw-r--r-- root/root 14597 2025-06-28 19:00 ./usr/share/doc/ruby-jwt/changelog.gz -rw-r--r-- root/root 1459 2025-10-28 18:04 ./usr/share/doc/ruby-jwt/copyright drwxr-xr-x root/root 0 2025-12-24 15:33 ./usr/share/rubygems-integration/ drwxr-xr-x root/root 0 2025-12-24 15:33 ./usr/share/rubygems-integration/all/ drwxr-xr-x root/root 0 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/ drwxr-xr-x root/root 0 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/ drwxr-xr-x root/root 0 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/ -rw-r--r-- root/root 1556 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt.rb drwxr-xr-x root/root 0 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/ -rw-r--r-- root/root 666 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/base64.rb -rw-r--r-- root/root 2142 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims.rb drwxr-xr-x root/root 0 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/ -rw-r--r-- root/root 1037 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/audience.rb -rw-r--r-- root/root 1178 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/crit.rb -rw-r--r-- root/root 1560 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/decode_verifier.rb -rw-r--r-- root/root 1051 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/expiration.rb -rw-r--r-- root/root 782 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/issued_at.rb -rw-r--r-- root/root 1071 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/issuer.rb -rw-r--r-- root/root 1144 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/jwt_id.rb -rw-r--r-- root/root 1076 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/not_before.rb -rw-r--r-- root/root 1299 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/numeric.rb -rw-r--r-- root/root 1071 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/required.rb -rw-r--r-- root/root 1005 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/subject.rb -rw-r--r-- root/root 2112 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/claims/verifier.rb -rw-r--r-- root/root 660 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/configuration.rb drwxr-xr-x root/root 0 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/configuration/ -rw-r--r-- root/root 1801 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/configuration/container.rb -rw-r--r-- root/root 2430 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/configuration/decode_configuration.rb -rw-r--r-- root/root 785 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/configuration/jwk_configuration.rb -rw-r--r-- root/root 3996 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/decode.rb -rw-r--r-- root/root 991 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/encode.rb -rw-r--r-- root/root 8112 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/encoded_token.rb -rw-r--r-- root/root 2202 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/error.rb -rw-r--r-- root/root 249 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/json.rb -rw-r--r-- root/root 2758 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwa.rb drwxr-xr-x root/root 0 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwa/ -rw-r--r-- root/root 4028 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwa/ecdsa.rb -rw-r--r-- root/root 2810 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwa/hmac.rb -rw-r--r-- root/root 341 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwa/none.rb -rw-r--r-- root/root 1190 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwa/ps.rb -rw-r--r-- root/root 1075 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwa/rsa.rb -rw-r--r-- root/root 1379 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwa/signing_algorithm.rb -rw-r--r-- root/root 403 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwa/unsupported.rb -rw-r--r-- root/root 1325 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk.rb drwxr-xr-x root/root 0 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk/ -rw-r--r-- root/root 8701 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk/ec.rb -rw-r--r-- root/root 2778 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk/hmac.rb -rw-r--r-- root/root 1702 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk/key_base.rb -rw-r--r-- root/root 2607 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk/key_finder.rb -rw-r--r-- root/root 226 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk/kid_as_key_digest.rb -rw-r--r-- root/root 7029 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk/rsa.rb -rw-r--r-- root/root 1921 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk/set.rb -rw-r--r-- root/root 460 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/jwk/thumbprint.rb -rw-r--r-- root/root 4264 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/token.rb -rw-r--r-- root/root 1296 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/version.rb -rw-r--r-- root/root 1854 2025-12-24 15:33 ./usr/share/rubygems-integration/all/gems/jwt-3.1.2/lib/jwt/x5c_key_finder.rb drwxr-xr-x root/root 0 2025-12-24 15:33 ./usr/share/rubygems-integration/all/specifications/ -rw-r--r-- root/root 1646 2025-12-24 15:33 ./usr/share/rubygems-integration/all/specifications/jwt-3.1.2.gemspec +------------------------------------------------------------------------------+ | Post Build Wed, 24 Dec 2025 15:34:38 +0000 | +------------------------------------------------------------------------------+ +------------------------------------------------------------------------------+ | Cleanup Wed, 24 Dec 2025 15:34:38 +0000 | +------------------------------------------------------------------------------+ Purging /build/reproducible-path Not cleaning session: cloned chroot in use +------------------------------------------------------------------------------+ | Summary Wed, 24 Dec 2025 15:34:38 +0000 | +------------------------------------------------------------------------------+ Build Architecture: amd64 Build Type: binary Build-Space: 1164 Build-Time: 11 Distribution: unstable Host Architecture: amd64 Install-Time: 7 Job: /home/admin/mass-rebuild/builds/3/ruby-jwt/ruby-jwt_3.1.2-1+rebuild1766590433.dsc Machine Architecture: amd64 Package: ruby-jwt Package-Time: 42 Source-Version: 3.1.2-1+rebuild1766590433 Space: 1164 Status: successful Version: 3.1.2-1+rebuild1766590433 -------------------------------------------------------------------------------- Finished at 2025-12-24T15:34:36Z Build needed 00:00:42, 1164k disk space