[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1004699: libdigest-bcrypt-perl breaks libdancer2-plugin-passphrase-perl autopkgtest: Bcrypt needs encoded text



Source: libdigest-bcrypt-perl, libdancer2-plugin-passphrase-perl
Control: found -1 libdigest-bcrypt-perl/1.212-1
Control: found -1 libdancer2-plugin-passphrase-perl/3.3.4-1
Severity: serious
Tags: sid bookworm
X-Debbugs-CC: debian-ci@lists.debian.org
User: debian-ci@lists.debian.org
Usertags: breaks needs-update

Dear maintainer(s),

With a recent upload of libdigest-bcrypt-perl the autopkgtest of libdancer2-plugin-passphrase-perl fails in testing when that autopkgtest is run with the binary packages of libdigest-bcrypt-perl from unstable. It passes when run with only packages from testing. In tabular form:

                                  pass            fail
libdigest-bcrypt-perl             from testing    1.212-1
libdancer2-plugin-passphrase-perl from testing    3.3.4-1
all others                        from testing    from testing

I copied some of the output at the bottom of this report.

Currently this regression is blocking the migration of libdigest-bcrypt-perl to testing [1]. Due to the nature of this issue, I filed this bug report against both packages. Can you please investigate the situation and reassign the bug to the right package?

More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=libdigest-bcrypt-perl

https://ci.debian.net/data/autopkgtest/testing/amd64/libd/libdancer2-plugin-passphrase-perl/18819128/log.gz

t/001_basics.t ...................... 1..1
ok 1 - use Dancer2::Plugin::Passphrase;
ok
t/003_default_settings.t ............ 1..3
ok 1 - RFC compliant hash generated
ok 2 - Match plaintext to hash
ok 3 - Incorrect passwords should be rejected
ok
t/004_all_algorithm_matching.t ...... 1..26
ok 1 - With Salt - Match plaintext to hash => MD5
ok 2 - With Salt - Incorrect passwords should be rejected => MD5
ok 3 - With Salt - Match plaintext to hash => SHA-1
ok 4 - With Salt - Incorrect passwords should be rejected => SHA-1
ok 5 - With Salt - Match plaintext to hash => SHA-224
ok 6 - With Salt - Incorrect passwords should be rejected => SHA-224
ok 7 - With Salt - Match plaintext to hash => SHA-256
ok 8 - With Salt - Incorrect passwords should be rejected => SHA-256
ok 9 - With Salt - Match plaintext to hash => SHA-384
ok 10 - With Salt - Incorrect passwords should be rejected => SHA-384
ok 11 - With Salt - Match plaintext to hash => SHA-512
ok 12 - With Salt - Incorrect passwords should be rejected => SHA-512
ok 13 - With Salt - Match plaintext to hash => Bcrypt
ok 14 - With Salt - Incorrect passwords should be rejected => Bcrypt
ok 15 - No Salt - Match plaintext to hash => MD5
ok 16 - No Salt - Incorrect passwords should be rejected => MD5
ok 17 - No Salt - Match plaintext to hash => SHA-1
ok 18 - No Salt - Incorrect passwords should be rejected => SHA-1
ok 19 - No Salt - Match plaintext to hash => SHA-224
ok 20 - No Salt - Incorrect passwords should be rejected => SHA-224
ok 21 - No Salt - Match plaintext to hash => SHA-256
ok 22 - No Salt - Incorrect passwords should be rejected => SHA-256
ok 23 - No Salt - Match plaintext to hash => SHA-384
ok 24 - No Salt - Incorrect passwords should be rejected => SHA-384
ok 25 - No Salt - Match plaintext to hash => SHA-512
ok 26 - No Salt - Incorrect passwords should be rejected => SHA-512
ok
t/005_random_passphrase.t ........... 1..3
ok 1 - Basic password generation
ok 2 - Custom password length
ok 3 - Custom chracter set
ok
t/006_return_object.t ............... 1..20
ok 1 - An object of class 'Dancer2::Plugin::Passphrase::Hashed' isa 'Dancer2::Plugin::Passphrase::Hashed'
ok 2 - Contains RFC 2307 representation
ok 3 - Contains correct scheme
ok 4 - Contains correct cost
ok 5 - Contains raw salt
ok 6 - Contains hex hash
ok 7 - Contains base64 hash
ok 8 - Contains raw salt
ok 9 - Contains hex salt
ok 10 - Contains base64 salt
ok 11 - Contains correct plaintext
ok 12 - Extracted raw salt is the same as the defined raw salt
ok 13 - Extracted base64 salt is the same as the defined base64 salt
ok 14 - Extracted hex salt is the same as the defined hex salt
ok 15 - Extracted raw hash is the same as the defined raw hash
ok 16 - Extracted base64 hash is the same as the defined base64 hash
ok 17 - Extracted hex hash is the same as the defined hex hash
ok 18 - Contains a defined, but empty raw salt
ok 19 - Contains a defined, but empty hex salt
ok 20 - Contains a defined, but empty base64 salt
ok
t/007_no_salt.t ..................... 1..2
ok 1 - Match plaintext to it's pre-computed hash
ok 2 - Match plaintext to it's generated hash
ok
t/008_unicode_matching.t ............ 1..8
ok 1 - UTF8 matches UTF8 for SHA-1
ok 2 - SHA-1 needs encoded text
ok 3 - UTF8 matches UTF8 for SHA-256
ok 4 - SHA-256 needs encoded text
ok 5 - UTF8 matches UTF8 for MD5
ok 6 - MD5 needs encoded text
ok 7 - UTF8 matches UTF8 for Bcrypt
not ok 8 - Bcrypt needs encoded text

#   Failed test 'Bcrypt needs encoded text'
#   at t/008_unicode_matching.t line 44.
# 'Wide character in subroutine entry at /usr/lib/x86_64-linux-gnu/perl5/5.32/Crypt/Bcrypt.pm line 21.
# '
#     doesn't match '(?^i:input must contain only octets)'
# Looks like you failed 1 test of 8.
Dubious, test returned 1 (wstat 256, 0x100)
Failed 1/8 subtests t/009_exception_handling.t .......... 1..2
ok 1 - Dies on invalid RFC 2307 string
ok 2 - Dies on almost valid RFC 2307 string
ok
t/011_alternative_bcrypt.t .......... 1..3
ok 1 - Matches $2a$ (ambiguous bcrypt)
ok 2 - Matches $2x$ (broken bcrypt)
ok 3 - Matches $2y$ (new standard bcrypt)
ok
t/013_hashes_generated_elsewhere.t .. 1..30
ok 1 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 2 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 3 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 4 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 5 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 6 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 7 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 8 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 9 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 10 - Old Dancer::Plugin::Passphrase Bcrypt hashes can be validated
ok 11 - Authen::Passphrase Bcrypt hashes can be validated
ok 12 - Authen::Passphrase Bcrypt hashes can be validated
ok 13 - Authen::Passphrase Bcrypt hashes can be validated
ok 14 - Authen::Passphrase Bcrypt hashes can be validated
ok 15 - Authen::Passphrase Bcrypt hashes can be validated
ok 16 - Authen::Passphrase Bcrypt hashes can be validated
ok 17 - Authen::Passphrase Bcrypt hashes can be validated
ok 18 - Authen::Passphrase Bcrypt hashes can be validated
ok 19 - Authen::Passphrase Bcrypt hashes can be validated
ok 20 - Authen::Passphrase Bcrypt hashes can be validated
ok 21 - Ruby Bcrypt hashes can be validated
ok 22 - Ruby Bcrypt hashes can be validated
ok 23 - Ruby Bcrypt hashes can be validated
ok 24 - Ruby Bcrypt hashes can be validated
ok 25 - Ruby Bcrypt hashes can be validated
ok 26 - Ruby Bcrypt hashes can be validated
ok 27 - Ruby Bcrypt hashes can be validated
ok 28 - Ruby Bcrypt hashes can be validated
ok 29 - Ruby Bcrypt hashes can be validated
ok 30 - Ruby Bcrypt hashes can be validated
ok

Test Summary Report
-------------------
t/008_unicode_matching.t          (Wstat: 256 Tests: 8 Failed: 1)
  Failed test:  8
  Non-zero exit status: 1
Files=10, Tests=98, 4 wallclock secs ( 0.06 usr 0.00 sys + 3.94 cusr 0.33 csys = 4.33 CPU)
Result: FAIL
autopkgtest [23:11:12]: test autodep8-perl-build-deps

Attachment: OpenPGP_signature
Description: OpenPGP digital signature


Reply to: