Originally reported downstream in Gentoo.
This seems to be flaky to me:
- 2.3.5 passed, then failed
- 2.3.6 failed, then passed
Snippet from log:
ASS: <keyboxd>tests/openpgp/issue2419.scm Checking robustness wrt empty databases in gnupghome (issue2417)... PASS: <keyboxd>tests/openpgp/issue2417.scm PASS: <keyboxd>tests/openpgp/delete-keys.scm Importing ssh keys... > dsa rsa ecdsa ed25519 < Checking for issue2316... PASS: <keyboxd>tests/openpgp/ssh-import.scm Checking key export > D74C5F22 C40FDECF ECABF51D < PASS: <keyboxd>tests/openpgp/export.scm Importing public key. Checking that the most recent, valid signing subkey is used by default > 8BC90111 3E880CFF F5F77B83 45117079 1EA97479 < Checking that the most recent, valid encryption subkey is used by default > 8BC90111 3E880CFF F5F77B83 45117079 1EA97479 < PASS: <keyboxd>tests/openpgp/default-key.scm Importing public key. Checking that the most recent, valid signing subkey is used by default > 8BC90111 3E880CFF F5F77B83 45117079 1EA97479 < Checking that we can select a specific signing key > 8BC90111 F5F77B83 (((/var/tmp/portage/app-crypt/gnupg-2.3.5-r1/work/gnupg-2.3.5/bin/gpg --no-permission-warning --always-trust --output - --verify --status-fd=1) 7706 1)) FAIL: <keyboxd>tests/openpgp/use-exact-key.scm Checking gpgtar without encryption Checking gpgtar without encryption with nicer actions Checking gpgtar with asymmetric encryption Checking gpgtar with asymmetric encryption and signature Checking gpgtar with signature Checking gpgtar with symmetric encryption Checking gpgtar with symmetric encryption and chosen cipher Checking gpgtar with both symmetric and asymmetric encryption PASS: <keyboxd>tests/openpgp/gpgtar.scm Checking WoT with trust signatures (PGP trust model)... PASS: <keyboxd>tests/openpgp/trust-pgp-2.scm Checking basic WoT (classic trust model)... PASS: <keyboxd>tests/openpgp/trust-pgp-1.scm Checking conventional encryption with MDC
Full tarball of logs:
.I can try get more information if needed but the flaky nature makes it harder.