Originally reported downstream in Gentoo.
This seems to be flaky to me:
- 2.3.5 passed, then failed
- 2.3.6 failed, then passed
Snippet from log:
ASS: <keyboxd>tests/openpgp/issue2419.scm
Checking robustness wrt empty databases in gnupghome (issue2417)...
PASS: <keyboxd>tests/openpgp/issue2417.scm
PASS: <keyboxd>tests/openpgp/delete-keys.scm
Importing ssh keys...
> dsa rsa ecdsa ed25519 <
Checking for issue2316...
PASS: <keyboxd>tests/openpgp/ssh-import.scm
Checking key export
> D74C5F22 C40FDECF ECABF51D <
PASS: <keyboxd>tests/openpgp/export.scm
Importing public key.
Checking that the most recent, valid signing subkey is used by default
> 8BC90111 3E880CFF F5F77B83 45117079 1EA97479 <
Checking that the most recent, valid encryption subkey is used by default
> 8BC90111 3E880CFF F5F77B83 45117079 1EA97479 <
PASS: <keyboxd>tests/openpgp/default-key.scm
Importing public key.
Checking that the most recent, valid signing subkey is used by default
> 8BC90111 3E880CFF F5F77B83 45117079 1EA97479 <
Checking that we can select a specific signing key
> 8BC90111 F5F77B83 (((/var/tmp/portage/app-crypt/gnupg-2.3.5-r1/work/gnupg-2.3.5/bin/gpg --no-permission-warning --always-trust --output - --verify --status-fd=1) 7706 1))
FAIL: <keyboxd>tests/openpgp/use-exact-key.scm
Checking gpgtar without encryption
Checking gpgtar without encryption with nicer actions
Checking gpgtar with asymmetric encryption
Checking gpgtar with asymmetric encryption and signature
Checking gpgtar with signature
Checking gpgtar with symmetric encryption
Checking gpgtar with symmetric encryption and chosen cipher
Checking gpgtar with both symmetric and asymmetric encryption
PASS: <keyboxd>tests/openpgp/gpgtar.scm
Checking WoT with trust signatures (PGP trust model)...
PASS: <keyboxd>tests/openpgp/trust-pgp-2.scm
Checking basic WoT (classic trust model)...
PASS: <keyboxd>tests/openpgp/trust-pgp-1.scm
Checking conventional encryption with MDCFull tarball of logs:
.I can try get more information if needed but the flaky nature makes it harder.