Build Logs

davenverse/tsec • 3.8.0:2026-01-13

Errors

0

Warnings

1180

Total Lines

3994

1##################################
2Clonning https://github.com/davenverse/tsec.git into /build/repo using revision v0.5.0
3##################################
4Note: switching to '6e4099dd4334f12f271332636fa3c8bd31db705e'.
5
6You are in 'detached HEAD' state. You can look around, make experimental
7changes and commit them, and you can discard any commits you make in this
8state without impacting any branches by switching back to a branch.
9
10If you want to create a new branch to retain commits you create, you may
11do so (now or later) by using -c with the switch command. Example:
12
13 git switch -c <new-branch-name>
14
15Or undo this operation with:
16
17 git switch -
18
19Turn off this advice by setting config variable advice.detachedHead to false
20
21Using target Scala version for migration: 3.7.4
22Migrating project for -source:3.5 using Scala 3.7.4
23----
24Preparing build for 3.7.4
25Would try to apply common scalacOption (best-effort, sbt/mill only):
26Append: -rewrite,REQUIRE:-source:3.5-migration
27Remove: -indent,-no-indent,-new-syntax,,-deprecation,-feature,-Xfatal-warnings,-Werror,MATCH:.*-Wconf.*any:e
28
29Try apply source patch:
30Path: project/plugins.sbt
31Pattern: % "0.5.3")
32Replacement: % "0.8.3")
33Starting compilation server
34Compiling project (Scala 3.7.3, JVM (17))
35Compiled project (Scala 3.7.3, JVM (17))
36Successfully applied pattern ' % "0.5.3")' in project/plugins.sbt
37
38Try apply source patch:
39Path: build.sbt
40Pattern: ThisBuild / tlSonatypeUseLegacyHost := true
41Replacement:
42Successfully applied pattern 'ThisBuild / tlSonatypeUseLegacyHost := true' in build.sbt
43----
44Starting build for 3.7.4
45Execute tests: false
46sbt project found:
47Sbt version 1.9.6 is not supported, minimal supported version is 1.11.5
48Enforcing usage of sbt in version 1.11.5
49No prepare script found for project davenverse/tsec
50##################################
51Scala version: 3.7.4
52Targets: io.github.jmcardon%tsec-bouncy io.github.jmcardon%tsec-cipher-bouncy io.github.jmcardon%tsec-cipher-core io.github.jmcardon%tsec-cipher-jca io.github.jmcardon%tsec-common io.github.jmcardon%tsec-hash-bouncy io.github.jmcardon%tsec-hash-jca io.github.jmcardon%tsec-http4s io.github.jmcardon%tsec-jwt-core io.github.jmcardon%tsec-jwt-mac io.github.jmcardon%tsec-jwt-sig io.github.jmcardon%tsec-mac io.github.jmcardon%tsec-password io.github.jmcardon%tsec-signatures
53Project projectConfig: {"projects":{"exclude":[],"overrides":{}},"java":{"version":"17"},"sbt":{"commands":[],"options":[]},"mill":{"options":[]},"tests":"compile-only","migrationVersions":["3.5"],"sourcePatches":[{"path":"project/plugins.sbt","pattern":" % \"0.5.3\")","replaceWith":" % \"0.8.3\")"},{"path":"build.sbt","pattern":"ThisBuild / tlSonatypeUseLegacyHost := true","replaceWith":""}]}
54##################################
55Using extra scalacOptions: -rewrite,REQUIRE:-source:3.5-migration
56Filtering out scalacOptions: -indent,-no-indent,-new-syntax,,-deprecation,-feature,-Xfatal-warnings,-Werror,MATCH:.*-Wconf.*any:e
57[sbt_options] declare -a sbt_options=()
58[process_args] java_version = '17'
59[copyRt] java9_rt = '/root/.sbt/1.0/java9-rt-ext-eclipse_adoptium_17_0_8/rt.jar'
60# Executing command line:
61java
62-Dfile.encoding=UTF8
63-Xms1G
64-Xmx6G
65-XX:ReservedCodeCacheSize=250M
66-XX:+TieredCompilation
67-XX:+UseG1GC
68-Dcommunitybuild.scala=3.7.4
69-Dcommunitybuild.project.dependencies.add=
70-Xmx7G
71-Xms4G
72-Xss8M
73-Dsbt.script=/root/.sdkman/candidates/sbt/current/bin/sbt
74-Dscala.ext.dirs=/root/.sbt/1.0/java9-rt-ext-eclipse_adoptium_17_0_8
75-jar
76/root/.sdkman/candidates/sbt/1.11.5/bin/sbt-launch.jar
77"setCrossScalaVersions 3.7.4"
78"++3.7.4 -v"
79"mapScalacOptions "-rewrite,REQUIRE:-source:3.5-migration,-Wconf:msg=can be rewritten automatically under:s" "-indent,-no-indent,-new-syntax,,-deprecation,-feature,-Xfatal-warnings,-Werror,MATCH:.*-Wconf.*any:e""
80"set every credentials := Nil"
81"excludeLibraryDependency com.github.ghik:zerowaste_{scalaVersion} com.olegpy:better-monadic-for_3 org.polyvariant:better-tostring_{scalaVersion} org.wartremover:wartremover_{scalaVersion}"
82"removeScalacOptionsStartingWith -P:wartremover"
83
84moduleMappings
85"runBuild 3.7.4 """{"projects":{"exclude":[],"overrides":{}},"java":{"version":"17"},"sbt":{"commands":[],"options":[]},"mill":{"options":[]},"tests":"compile-only","migrationVersions":["3.5"],"sourcePatches":[{"path":"project/plugins.sbt","pattern":" % \"0.5.3\")","replaceWith":" % \"0.8.3\")"},{"path":"build.sbt","pattern":"ThisBuild / tlSonatypeUseLegacyHost := true","replaceWith":""}]}""" io.github.jmcardon%tsec-bouncy io.github.jmcardon%tsec-cipher-bouncy io.github.jmcardon%tsec-cipher-core io.github.jmcardon%tsec-cipher-jca io.github.jmcardon%tsec-common io.github.jmcardon%tsec-hash-bouncy io.github.jmcardon%tsec-hash-jca io.github.jmcardon%tsec-http4s io.github.jmcardon%tsec-jwt-core io.github.jmcardon%tsec-jwt-mac io.github.jmcardon%tsec-jwt-sig io.github.jmcardon%tsec-mac io.github.jmcardon%tsec-password io.github.jmcardon%tsec-signatures"
86
87[info] welcome to sbt 1.11.5 (Eclipse Adoptium Java 17.0.8)
88[info] loading project definition from /build/repo/project/project
89[info] compiling 1 Scala source to /build/repo/project/project/target/scala-2.12/sbt-1.0/classes ...
90[info] Non-compiled module 'compiler-bridge_2.12' for Scala 2.12.20. Compiling...
91[info] Compilation completed in 8.917s.
92[info] done compiling
93[info] loading settings for project repo-build from akka.sbt, plugins.sbt...
94[info] loading project definition from /build/repo/project
95[info] compiling 4 Scala sources to /build/repo/project/target/scala-2.12/sbt-1.0/classes ...
96[info] done compiling
97[info] loading settings for project root from build.sbt...
98[info] resolving key references (25243 settings) ...
99[info] set scmInfo to https://github.com/davenverse/tsec
100[info] set current project to root (in build file:/build/repo/)
101Execute setCrossScalaVersions: 3.7.4
102OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-bouncy/crossScalaVersions
103OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in rootJVM/crossScalaVersions
104OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-libsodium/crossScalaVersions
105OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-jwt-mac/crossScalaVersions
106OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-cipher-core/crossScalaVersions
107[info] set scmInfo to https://github.com/davenverse/tsec
108OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-cipher-jca/crossScalaVersions
109OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in root/crossScalaVersions
110OpenCB::Limitting incorrect crossVersions List() -> List(3.7.4) in root/crossScalaVersions
111OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-cipher-bouncy/crossScalaVersions
112OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-jwt-core/crossScalaVersions
113OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in rootNative/crossScalaVersions
114OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-http4s/crossScalaVersions
115OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in rootJS/crossScalaVersions
116OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-signatures/crossScalaVersions
117OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-mac/crossScalaVersions
118OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-hash-jca/crossScalaVersions
119OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-common/crossScalaVersions
120OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-examples/crossScalaVersions
121OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-bench/crossScalaVersions
122OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-hash-bouncy/crossScalaVersions
123OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-jwt-sig/crossScalaVersions
124OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-password/crossScalaVersions
125OpenCB::Changing crossVersion 3.3.0 -> 3.7.4 in tsec-oauth2/crossScalaVersions
126[info] set current project to root (in build file:/build/repo/)
127[info] Setting Scala version to 3.7.4 on 22 projects.
128[info] Switching Scala version on:
129[info] tsec-bouncy (2.12.18, 2.13.12, 3.7.4)
130[info] tsec-password (2.12.18, 2.13.12, 3.7.4)
131[info] * root (3.7.4)
132[info] rootJS (2.12.18, 2.13.12, 3.7.4)
133[info] tsec-bench (2.12.18, 2.13.12, 3.7.4)
134[info] tsec-mac (2.12.18, 2.13.12, 3.7.4)
135[info] tsec-examples (2.12.18, 2.13.12, 3.7.4)
136[info] tsec-oauth2 (2.12.18, 2.13.12, 3.7.4)
137[info] tsec-cipher-jca (2.12.18, 2.13.12, 3.7.4)
138[info] tsec-hash-bouncy (2.12.18, 2.13.12, 3.7.4)
139[info] tsec-cipher-bouncy (2.12.18, 2.13.12, 3.7.4)
140[info] tsec-jwt-core (2.12.18, 2.13.12, 3.7.4)
141[info] rootJVM (2.12.18, 2.13.12, 3.7.4)
142[info] rootNative (2.12.18, 2.13.12, 3.7.4)
143[info] tsec-cipher-core (2.12.18, 2.13.12, 3.7.4)
144[info] tsec-jwt-sig (2.12.18, 2.13.12, 3.7.4)
145[info] tsec-libsodium (2.12.18, 2.13.12, 3.7.4)
146[info] tsec-http4s (2.12.18, 2.13.12, 3.7.4)
147[info] tsec-common (2.12.18, 2.13.12, 3.7.4)
148[info] tsec-jwt-mac (2.12.18, 2.13.12, 3.7.4)
149[info] tsec-hash-jca (2.12.18, 2.13.12, 3.7.4)
150[info] tsec-signatures (2.12.18, 2.13.12, 3.7.4)
151[info] Excluding projects:
152[info] Reapplying settings...
153[info] set scmInfo to https://github.com/davenverse/tsec
154[info] set current project to root (in build file:/build/repo/)
155Execute mapScalacOptions: -rewrite,REQUIRE:-source:3.5-migration,-Wconf:msg=can be rewritten automatically under:s -indent,-no-indent,-new-syntax,,-deprecation,-feature,-Xfatal-warnings,-Werror,MATCH:.*-Wconf.*any:e
156[info] Reapplying settings...
157[info] set scmInfo to https://github.com/davenverse/tsec
158[info] set current project to root (in build file:/build/repo/)
159[info] Defining Global / credentials, credentials and 20 others.
160[info] The new values will be used by Compile / scalafmtOnly, IntegrationTest / scalafmtOnly and 196 others.
161[info] Run `last` for details.
162[info] Reapplying settings...
163[info] set scmInfo to https://github.com/davenverse/tsec
164[info] set current project to root (in build file:/build/repo/)
165Execute excludeLibraryDependency: com.github.ghik:zerowaste_{scalaVersion} com.olegpy:better-monadic-for_3 org.polyvariant:better-tostring_{scalaVersion} org.wartremover:wartremover_{scalaVersion}
166[info] Reapplying settings...
167OpenCB::Failed to reapply settings in excludeLibraryDependency: Reference to undefined setting:
168
169 Global / allExcludeDependencies from Global / allExcludeDependencies (CommunityBuildPlugin.scala:331)
170 Did you mean rootJVM / allExcludeDependencies ?
171 , retry without global scopes
172[info] Reapplying settings...
173[info] set scmInfo to https://github.com/davenverse/tsec
174[info] set current project to root (in build file:/build/repo/)
175Execute removeScalacOptionsStartingWith: -P:wartremover
176[info] Reapplying settings...
177[info] set scmInfo to https://github.com/davenverse/tsec
178[info] set current project to root (in build file:/build/repo/)
179[success] Total time: 0 s, completed Jan 13, 2026, 5:19:24 PM
180Build config: {"projects":{"exclude":[],"overrides":{}},"java":{"version":"17"},"sbt":{"commands":[],"options":[]},"mill":{"options":[]},"tests":"compile-only","migrationVersions":["3.5"],"sourcePatches":[{"path":"project/plugins.sbt","pattern":" % \"0.5.3\")","replaceWith":" % \"0.8.3\")"},{"path":"build.sbt","pattern":"ThisBuild / tlSonatypeUseLegacyHost := true","replaceWith":""}]}
181Parsed config: Success(ProjectBuildConfig(ProjectsConfig(List(),Map()),CompileOnly,List()))
182Starting build...
183Projects: Set(tsec-bouncy, tsec-password, tsec-mac, tsec-cipher-jca, tsec-hash-bouncy, tsec-cipher-bouncy, tsec-jwt-core, tsec-cipher-core, tsec-jwt-sig, tsec-http4s, tsec-common, tsec-jwt-mac, tsec-hash-jca, tsec-signatures)
184Starting build for ProjectRef(file:/build/repo/,tsec-cipher-core) (tsec-cipher-core)... [0/14]
185OpenCB::Exclude Scala3 specific scalacOption `-rewrite` in Scala 2.12.20 module Global
186OpenCB::Exclude Scala3 specific scalacOption `REQUIRE:-source:3.5-migration` in Scala 2.12.20 module Global
187OpenCB::Filter out '-deprecation', matches setting pattern '^-?-deprecation'
188OpenCB::Filter out '-feature', matches setting pattern '^-?-feature'
189Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, -java-output-version, 8, -rewrite, -Wconf:msg=can be rewritten automatically under:s, -source:3.5-migration
190[info] compiling 34 Scala sources to /build/repo/common/target/scala-3.7.4/classes ...
191[warn] -- Warning: /build/repo/common/src/main/scala/tsec/common/CanCatch.scala:1:13 --
192[warn] 1 |package tsec.common
193[warn] |^^^^^^^^^^^^^^^^^^^
194[warn] |No class, trait or object is defined in the compilation unit.
195[warn] |The incremental compiler cannot record the dependency information in such case.
196[warn] |Some errors like unused import referring to a non-existent class might not be reported.
197[warn] -- [E198] Unused Symbol Warning: /build/repo/common/src/main/scala/tsec/common/ByteUtils.scala:3:21
198[warn] 3 |import java.security.MessageDigest
199[warn] | ^^^^^^^^^^^^^
200[warn] | unused import
201[warn] -- [E198] Unused Symbol Warning: /build/repo/common/src/main/scala/tsec/mac/MessageAuth.scala:4:20
202[warn] 4 |import tsec.common.{CryptoTag, VerificationFailed, VerificationStatus, Verified}
203[warn] | ^^^^^^^^^
204[warn] | unused import
205[info] [patched file /build/repo/common/src/main/scala/tsec/cipher/symmetric/CipherAPI.scala]
206[info] [patched file /build/repo/common/src/main/scala/tsec/mac/MessageAuth.scala]
207[info] [patched file /build/repo/common/src/main/scala/tsec/common/ByteUtils.scala]
208[warn] three warnings found
209[info] done compiling
210[info] compiling 9 Scala sources to /build/repo/cipher-core/target/scala-3.7.4/classes ...
211[info] done compiling
212[info] compiling 3 Scala sources to /build/repo/common/target/scala-3.7.4/classes ...
213[info] done compiling
214[info] compiling 3 Scala sources to /build/repo/common/target/scala-3.7.4/test-classes ...
215[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:47:10
216[warn] 47 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
217[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
218[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
219[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:84:10
220[warn] 84 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
221[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
222[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
223[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:98:10
224[warn] 98 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
225[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
226[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
227[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:112:10
228[warn] 112 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
229[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
230[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
231[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:126:10
232[warn] 126 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
233[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
234[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
235[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:162:10
236[warn] 162 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
237[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
238[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
239[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:176:10
240[warn] 176 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
241[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
242[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
243[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:190:10
244[warn] 190 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
245[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
246[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
247[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:205:10
248[warn] 205 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
249[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
250[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
251[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:219:10
252[warn] 219 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
253[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
254[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
255[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:233:10
256[warn] 233 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
257[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
258[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
259[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:247:10
260[warn] 247 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
261[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
262[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
263[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:262:10
264[warn] 262 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
265[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
266[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
267[info] [patched file /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala]
268[warn] 13 warnings found
269[info] done compiling
270[info] compiling 1 Scala source to /build/repo/common/target/scala-3.7.4/test-classes ...
271[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:47:10
272[warn] 47 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
273[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
274[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
275[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:84:10
276[warn] 84 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
277[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
278[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
279[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:98:10
280[warn] 98 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
281[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
282[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
283[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:112:10
284[warn] 112 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
285[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
286[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
287[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:126:10
288[warn] 126 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
289[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
290[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
291[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:162:10
292[warn] 162 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
293[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
294[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
295[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:176:10
296[warn] 176 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
297[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
298[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
299[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:190:10
300[warn] 190 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
301[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
302[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
303[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:205:10
304[warn] 205 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
305[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
306[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
307[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:219:10
308[warn] 219 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
309[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
310[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
311[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:233:10
312[warn] 233 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
313[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
314[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
315[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:247:10
316[warn] 247 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
317[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
318[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
319[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:262:10
320[warn] 262 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
321[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
322[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
323[warn] 13 warnings found
324[info] done compiling
325Starting build for ProjectRef(file:/build/repo/,tsec-jwt-core) (tsec-jwt-core)... [1/14]
326Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, -java-output-version, 8, -rewrite, -Wconf:msg=can be rewritten automatically under:s, -source:3.5-migration
327[info] compiling 1 Scala source to /build/repo/bouncycastle/target/scala-3.7.4/classes ...
328[info] compiling 6 Scala sources to /build/repo/mac/target/scala-3.7.4/classes ...
329[warn] -- [E175] Potential Issue Warning: /build/repo/bouncycastle/src/main/scala/tsec/Bouncy.scala:13:26
330[warn] 13 | Security.addProvider(new BouncyCastleProvider())
331[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
332[warn] | discarded non-Unit value of type Int. Add `: Unit` to discard silently.
333[warn] one warning found
334[info] done compiling
335[info] compiling 11 Scala sources to /build/repo/signatures/target/scala-3.7.4/classes ...
336[warn] -- [E198] Unused Symbol Warning: /build/repo/mac/src/main/scala/tsec/mac/jca/WithMacSigningKey.scala:12:66
337[warn] 12 |protected[tsec] abstract class WithMacSigningKey[A](algo: String, keyLenBits: Int)
338[warn] | ^^^^^^^^^^
339[warn] | unused explicit parameter
340[info] [patched file /build/repo/mac/src/main/scala/tsec/mac/jca/package.scala]
341[warn] one warning found
342[info] done compiling
343[info] done compiling
344[info] compiling 10 Scala sources and 1 Java source to /build/repo/jwt-core/target/scala-3.7.4/classes ...
345[warn] -- [E175] Potential Issue Warning: /build/repo/jwt-core/src/main/scala/tsec/jwt/util/ParseEncodedKeySpec.scala:36:19
346[warn] 36 | me.raiseError(GeneralSignatureError("Invalid ECDSA signature format"))
347[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
348[warn] |discarded non-Unit value of type F[Any]. Add `: Unit` to discard silently.
349[warn] |
350[warn] |where: F is a type in method derToConcat with bounds <: [_] =>> Any
351[warn] -- [E175] Potential Issue Warning: /build/repo/jwt-core/src/main/scala/tsec/jwt/util/ParseEncodedKeySpec.scala:61:19
352[warn] 61 | me.raiseError(GeneralSignatureError("Invalid ECDSA signature format"))
353[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
354[warn] |discarded non-Unit value of type F[Any]. Add `: Unit` to discard silently.
355[warn] |
356[warn] |where: F is a type in method derToConcat with bounds <: [_] =>> Any
357[warn] -- [E175] Potential Issue Warning: /build/repo/jwt-core/src/main/scala/tsec/jwt/util/ParseEncodedKeySpec.scala:94:19
358[warn] 94 | me.raiseError(GeneralSignatureError("Invalid ECDSA signature format"))
359[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
360[warn] |discarded non-Unit value of type F[Any]. Add `: Unit` to discard silently.
361[warn] |
362[warn] |where: F is a type in method concatSignatureToDER with bounds <: [_] =>> Any
363[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-core/src/main/scala/tsec/jwt/algorithms/JWA.scala:74:36
364[warn] 74 |abstract class JWTRSASig[A: RSAKFTag] extends JWTSigAlgo[A] {
365[warn] | ^
366[warn] | unused implicit parameter
367[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-core/src/main/scala/tsec/jwt/header/package.scala:4:22
368[warn] 4 |import cats.implicits._
369[warn] | ^
370[warn] | unused import
371[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-core/src/main/scala/tsec/jwt/package.scala:5:22
372[warn] 5 |import cats.implicits._
373[warn] | ^
374[warn] | unused import
375[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-core/src/main/scala/tsec/jwt/util/ParseEncodedKeySpec.scala:82:43
376[warn] 82 | )(implicit me: MonadError[F, Throwable], ecTag: ECKFTag[A]): F[Array[Byte]] = {
377[warn] | ^^^^^
378[warn] | unused implicit parameter
379[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-core/src/main/scala/tsec/jwt/util/ParseEncodedKeySpec.scala:96:8
380[warn] 96 | var signatureDER = scala.collection.mutable.ListBuffer.empty[Byte]
381[warn] | ^^^^^^^^^^^^
382[warn] | unset local variable, consider using an immutable val instead
383[info] [patched file /build/repo/jwt-core/src/main/scala/tsec/jwt/package.scala]
384[info] [patched file /build/repo/jwt-core/src/main/scala/tsec/jwt/header/package.scala]
385[warn] 8 warnings found
386[info] done compiling
387[info] compiling 1 Scala source to /build/repo/mac/target/scala-3.7.4/classes ...
388[info] done compiling
389[info] compiling 2 Scala sources to /build/repo/mac/target/scala-3.7.4/classes ...
390[warn] -- [E198] Unused Symbol Warning: /build/repo/mac/src/main/scala/tsec/mac/jca/WithMacSigningKey.scala:12:66
391[warn] 12 |protected[tsec] abstract class WithMacSigningKey[A](algo: String, keyLenBits: Int)
392[warn] | ^^^^^^^^^^
393[warn] | unused explicit parameter
394[warn] one warning found
395[info] done compiling
396[info] compiling 2 Scala sources to /build/repo/jwt-core/target/scala-3.7.4/classes ...
397[info] done compiling
398[info] compiling 1 Scala source to /build/repo/jwt-core/target/scala-3.7.4/test-classes ...
399[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-core/src/test/scala/tsec/jwt/JWTClaimsTest.scala:5:26
400[warn] 5 |import cats.syntax.either._
401[warn] | ^
402[warn] | unused import
403[info] [patched file /build/repo/jwt-core/src/test/scala/tsec/jwt/JWTClaimsTest.scala]
404[warn] one warning found
405[info] done compiling
406[info] compiling 1 Scala source to /build/repo/jwt-core/target/scala-3.7.4/test-classes ...
407[info] done compiling
408Starting build for ProjectRef(file:/build/repo/,tsec-jwt-mac) (tsec-jwt-mac)... [2/14]
409Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, -java-output-version, 8, -rewrite, -Wconf:msg=can be rewritten automatically under:s, -source:3.5-migration
410[info] compiling 3 Scala sources to /build/repo/jwt-mac/target/scala-3.7.4/classes ...
411[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWSMacHeader.scala:4:26
412[warn] 4 |import cats.syntax.either._
413[warn] | ^
414[warn] | unused import
415[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWSMacHeader.scala:37:36
416[warn] 37 | implicit def encoder[A: JWTMacAlgo]: Encoder[JWSMacHeader[A]] {
417[warn] | ^
418[warn] | unused implicit parameter
419[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWSMacHeader.scala:81:42
420[warn] 81 | implicit def genSerializer[A: JWTMacAlgo](
421[warn] | ^
422[warn] | unused implicit parameter
423[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:46:43
424[warn] 46 | def generateSignature[F[_], A: JWTMacAlgo](
425[warn] | ^
426[warn] | unused implicit parameter
427[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:52:6
428[warn] 52 | me: Sync[F]
429[warn] | ^^
430[warn] | unused implicit parameter
431[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:57:6
432[warn] 57 | me: Sync[F]
433[warn] | ^^
434[warn] | unused implicit parameter
435[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:60:39
436[warn] 60 | def buildToString[F[_], A: JWTMacAlgo](
437[warn] | ^
438[warn] | unused implicit parameter
439[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:64:32
440[warn] 64 | )(implicit s: JWSMacCV[F, A], me: Sync[F]): F[String] = s.signToString(header, body, key)
441[warn] | ^^
442[warn] | unused implicit parameter
443[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:69:32
444[warn] 69 | )(implicit s: JWSMacCV[F, A], me: Sync[F]): F[String] = s.signToString(JWSMacHeader[A], body, key)
445[warn] | ^^
446[warn] | unused implicit parameter
447[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:71:36
448[warn] 71 | def verifyBool[F[_], A: JWTMacAlgo](jwt: String, key: MacSigningKey[A])(
449[warn] | ^
450[warn] | unused implicit parameter
451[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:76:32
452[warn] 76 | def verify[F[_], A: JWTMacAlgo](jwt: String, key: MacSigningKey[A])(
453[warn] | ^
454[warn] | unused implicit parameter
455[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:87:46
456[warn] 87 | def verifyFromStringBool[F[_], A: JWTMacAlgo](jwt: String, key: MacSigningKey[A])(
457[warn] | ^
458[warn] | unused implicit parameter
459[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:92:48
460[warn] 92 | def verifyFromInstanceBool[F[_], A: JWTMacAlgo](jwt: JWTMac[A], key: MacSigningKey[A])(
461[warn] | ^
462[warn] | unused implicit parameter
463[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:98:42
464[warn] 98 | def verifyFromString[F[_], A: JWTMacAlgo](jwt: String, key: MacSigningKey[A])(
465[warn] | ^
466[warn] | unused implicit parameter
467[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:103:44
468[warn] 103 | def verifyFromInstance[F[_], A: JWTMacAlgo](jwt: JWTMac[A], key: MacSigningKey[A])(
469[warn] | ^
470[warn] | unused implicit parameter
471[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:109:41
472[warn] 109 | def toEncodedString[F[_], A: JWTMacAlgo](
473[warn] | ^
474[warn] | unused implicit parameter
475[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:111:32
476[warn] 111 | )(implicit s: JWSMacCV[F, A], me: Sync[F]): String = s.toEncodedString(jwt)
477[warn] | ^^
478[warn] | unused implicit parameter
479[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:113:41
480[warn] 113 | def parseUnverified[F[_], A: JWTMacAlgo](
481[warn] | ^
482[warn] | unused implicit parameter
483[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:115:32
484[warn] 115 | )(implicit s: JWSMacCV[F, A], me: Sync[F]): F[JWTMac[A]] = s.parseUnverified(jwt)
485[warn] | ^^
486[warn] | unused implicit parameter
487[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:143:37
488[warn] 143 | def generateSignature[A: JWTMacAlgo](header: JWSMacHeader[A], body: JWTClaims, key: MacSigningKey[A])(
489[warn] | ^
490[warn] | unused implicit parameter
491[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:157:33
492[warn] 157 | def buildToString[A: JWTMacAlgo](
493[warn] | ^
494[warn] | unused implicit parameter
495[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:171:36
496[warn] 171 | def verifyFromString[A: JWTMacAlgo](jwt: String, key: MacSigningKey[A])(
497[warn] | ^
498[warn] | unused implicit parameter
499[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:175:38
500[warn] 175 | def verifyFromInstance[A: JWTMacAlgo](jwt: JWTMac[A], key: MacSigningKey[A])(
501[warn] | ^
502[warn] | unused implicit parameter
503[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:183:35
504[warn] 183 | def toEncodedString[A: JWTMacAlgo](
505[warn] | ^
506[warn] | unused implicit parameter
507[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:187:35
508[warn] 187 | def parseUnverified[A: JWTMacAlgo](
509[warn] | ^
510[warn] | unused implicit parameter
511[warn] -- [E092] Pattern Match Unchecked Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:28:9
512[warn] 28 | case j: JWTMac[A] => ==(j)
513[warn] | ^
514[warn] |the type test for tsec.jws.mac.JWTMac[A] cannot be checked at runtime because its type arguments can't be determined from Any
515[warn] |
516[warn] | longer explanation available when compiling with `-explain`
517[info] [patched file /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWSMacHeader.scala]
518[info] [patched file /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWSMacCV.scala]
519[warn] 26 warnings found
520[info] done compiling
521[info] compiling 3 Scala sources to /build/repo/jwt-mac/target/scala-3.7.4/classes ...
522[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWSMacHeader.scala:36:36
523[warn] 36 | implicit def encoder[A: JWTMacAlgo]: Encoder[JWSMacHeader[A]] {
524[warn] | ^
525[warn] | unused implicit parameter
526[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWSMacHeader.scala:80:42
527[warn] 80 | implicit def genSerializer[A: JWTMacAlgo](
528[warn] | ^
529[warn] | unused implicit parameter
530[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:46:43
531[warn] 46 | def generateSignature[F[_], A: JWTMacAlgo](
532[warn] | ^
533[warn] | unused implicit parameter
534[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:52:6
535[warn] 52 | me: Sync[F]
536[warn] | ^^
537[warn] | unused implicit parameter
538[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:57:6
539[warn] 57 | me: Sync[F]
540[warn] | ^^
541[warn] | unused implicit parameter
542[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:60:39
543[warn] 60 | def buildToString[F[_], A: JWTMacAlgo](
544[warn] | ^
545[warn] | unused implicit parameter
546[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:64:32
547[warn] 64 | )(implicit s: JWSMacCV[F, A], me: Sync[F]): F[String] = s.signToString(header, body, key)
548[warn] | ^^
549[warn] | unused implicit parameter
550[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:69:32
551[warn] 69 | )(implicit s: JWSMacCV[F, A], me: Sync[F]): F[String] = s.signToString(JWSMacHeader[A], body, key)
552[warn] | ^^
553[warn] | unused implicit parameter
554[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:71:36
555[warn] 71 | def verifyBool[F[_], A: JWTMacAlgo](jwt: String, key: MacSigningKey[A])(
556[warn] | ^
557[warn] | unused implicit parameter
558[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:76:32
559[warn] 76 | def verify[F[_], A: JWTMacAlgo](jwt: String, key: MacSigningKey[A])(
560[warn] | ^
561[warn] | unused implicit parameter
562[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:87:46
563[warn] 87 | def verifyFromStringBool[F[_], A: JWTMacAlgo](jwt: String, key: MacSigningKey[A])(
564[warn] | ^
565[warn] | unused implicit parameter
566[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:92:48
567[warn] 92 | def verifyFromInstanceBool[F[_], A: JWTMacAlgo](jwt: JWTMac[A], key: MacSigningKey[A])(
568[warn] | ^
569[warn] | unused implicit parameter
570[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:98:42
571[warn] 98 | def verifyFromString[F[_], A: JWTMacAlgo](jwt: String, key: MacSigningKey[A])(
572[warn] | ^
573[warn] | unused implicit parameter
574[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:103:44
575[warn] 103 | def verifyFromInstance[F[_], A: JWTMacAlgo](jwt: JWTMac[A], key: MacSigningKey[A])(
576[warn] | ^
577[warn] | unused implicit parameter
578[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:109:41
579[warn] 109 | def toEncodedString[F[_], A: JWTMacAlgo](
580[warn] | ^
581[warn] | unused implicit parameter
582[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:111:32
583[warn] 111 | )(implicit s: JWSMacCV[F, A], me: Sync[F]): String = s.toEncodedString(jwt)
584[warn] | ^^
585[warn] | unused implicit parameter
586[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:113:41
587[warn] 113 | def parseUnverified[F[_], A: JWTMacAlgo](
588[warn] | ^
589[warn] | unused implicit parameter
590[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:115:32
591[warn] 115 | )(implicit s: JWSMacCV[F, A], me: Sync[F]): F[JWTMac[A]] = s.parseUnverified(jwt)
592[warn] | ^^
593[warn] | unused implicit parameter
594[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:143:37
595[warn] 143 | def generateSignature[A: JWTMacAlgo](header: JWSMacHeader[A], body: JWTClaims, key: MacSigningKey[A])(
596[warn] | ^
597[warn] | unused implicit parameter
598[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:157:33
599[warn] 157 | def buildToString[A: JWTMacAlgo](
600[warn] | ^
601[warn] | unused implicit parameter
602[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:171:36
603[warn] 171 | def verifyFromString[A: JWTMacAlgo](jwt: String, key: MacSigningKey[A])(
604[warn] | ^
605[warn] | unused implicit parameter
606[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:175:38
607[warn] 175 | def verifyFromInstance[A: JWTMacAlgo](jwt: JWTMac[A], key: MacSigningKey[A])(
608[warn] | ^
609[warn] | unused implicit parameter
610[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:183:35
611[warn] 183 | def toEncodedString[A: JWTMacAlgo](
612[warn] | ^
613[warn] | unused implicit parameter
614[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:187:35
615[warn] 187 | def parseUnverified[A: JWTMacAlgo](
616[warn] | ^
617[warn] | unused implicit parameter
618[warn] -- [E092] Pattern Match Unchecked Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:28:9
619[warn] 28 | case j: JWTMac[A] => ==(j)
620[warn] | ^
621[warn] |the type test for tsec.jws.mac.JWTMac[A] cannot be checked at runtime because its type arguments can't be determined from Any
622[warn] |
623[warn] | longer explanation available when compiling with `-explain`
624[warn] 25 warnings found
625[info] done compiling
626[info] compiling 1 Scala source to /build/repo/jwt-mac/target/scala-3.7.4/test-classes ...
627[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/test/scala/tsec/JWTMacTests.scala:6:26
628[warn] 6 |import cats.syntax.either._
629[warn] | ^
630[warn] | unused import
631[info] [patched file /build/repo/jwt-mac/src/test/scala/tsec/JWTMacTests.scala]
632[warn] one warning found
633[info] done compiling
634[info] compiling 1 Scala source to /build/repo/jwt-mac/target/scala-3.7.4/test-classes ...
635[info] done compiling
636Starting build for ProjectRef(file:/build/repo/,tsec-mac) (tsec-mac)... [3/14]
637Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, -java-output-version, 8, -rewrite, -Wconf:msg=can be rewritten automatically under:s, -source:3.5-migration
638[info] compiling 1 Scala source to /build/repo/mac/target/scala-3.7.4/test-classes ...
639[info] done compiling
640Starting build for ProjectRef(file:/build/repo/,tsec-cipher-bouncy) (tsec-cipher-bouncy)... [4/14]
641Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, -java-output-version, 8, -rewrite, -Wconf:msg=can be rewritten automatically under:s, -source:3.5-migration
642[info] compiling 6 Scala sources and 2 Java sources to /build/repo/cipher-bouncy/target/scala-3.7.4/classes ...
643[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-bouncy/src/main/scala/tsec/cipher/symmetric/bouncy/ChaCha20Cipher.scala:363:20
644[warn] 363 | poly1305.doFinal(tagOut, tOutOffset)
645[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
646[warn] |discarded non-Unit value of type Int. Add `: Unit` to discard silently.
647[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-bouncy/src/main/scala/tsec/cipher/symmetric/bouncy/ChaCha20Poly1305.scala:36:20
648[warn] 36 | poly1305.doFinal(tagOut, tOutOffset)
649[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
650[warn] | discarded non-Unit value of type Int. Add `: Unit` to discard silently.
651[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-bouncy/src/main/scala/tsec/cipher/symmetric/bouncy/XSalsa20Poly1305.scala:9:12
652[warn] 9 |import tsec.Bouncy
653[warn] | ^^^^^^
654[warn] | unused import
655[info] [patched file /build/repo/cipher-bouncy/src/main/scala/tsec/cipher/symmetric/bouncy/XSalsa20Poly1305.scala]
656[warn] three warnings found
657[info] done compiling
658[info] compiling 1 Scala source to /build/repo/cipher-bouncy/target/scala-3.7.4/classes ...
659[info] done compiling
660[info] compiling 1 Scala source to /build/repo/cipher-bouncy/target/scala-3.7.4/test-classes ...
661[info] done compiling
662Starting build for ProjectRef(file:/build/repo/,tsec-signatures) (tsec-signatures)... [5/14]
663Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, -java-output-version, 8, -rewrite, -Wconf:msg=can be rewritten automatically under:s, -source:3.5-migration
664[info] compiling 1 Scala source to /build/repo/signatures/target/scala-3.7.4/test-classes ...
665[info] done compiling
666Starting build for ProjectRef(file:/build/repo/,tsec-password) (tsec-password)... [6/14]
667Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, -java-output-version, 8, -rewrite, -Wconf:msg=can be rewritten automatically under:s, -source:3.5-migration
668[info] compiling 7 Scala sources and 1 Java source to /build/repo/password-hashers/target/scala-3.7.4/classes ...
669[warn] there were 2 deprecation warnings; re-run with -deprecation for details
670[warn] one warning found
671[warn] /build/repo/password-hashers/src/main/scala/tsec/passwordhashers/jca/internal/JBCrypt.java:498:13: redundant cast to int[]
672[warn] (int[])P_orig.clone()
673[warn] ^
674[warn] /build/repo/password-hashers/src/main/scala/tsec/passwordhashers/jca/internal/JBCrypt.java:499:13: redundant cast to int[]
675[warn] (int[])S_orig.clone()
676[warn] ^
677[info] done compiling
678[info] compiling 1 Scala source to /build/repo/password-hashers/target/scala-3.7.4/test-classes ...
679[info] done compiling
680Starting build for ProjectRef(file:/build/repo/,tsec-common) (tsec-common)... [7/14]
681Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, -java-output-version, 8, -rewrite, -Wconf:msg=can be rewritten automatically under:s, -source:3.5-migration
682Starting build for ProjectRef(file:/build/repo/,tsec-cipher-jca) (tsec-cipher-jca)... [8/14]
683Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, -java-output-version, 8, -rewrite, -Wconf:msg=can be rewritten automatically under:s, -source:3.5-migration
684[info] compiling 17 Scala sources to /build/repo/cipher-symmetric/target/scala-3.7.4/classes ...
685[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:47:61
686[warn] 47 | private[tsec] def standardProcess[A, M, P: SymmetricPadding](
687[warn] | ^
688[warn] | unused implicit parameter
689[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:105:42
690[warn] 105 | implicit def ecbProcess[A: BlockCipher]: IvProcess[A, ECB, NoPadding] =
691[warn] | ^
692[warn] | unused implicit parameter
693[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:130:40
694[warn] 130 | implicit def gcmProcess[A](implicit aes: AES[A]): IvProcess[A, GCM, NoPadding] =
695[warn] | ^^^
696[warn] | unused implicit parameter
697[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:151:39
698[warn] 151 | def randomIVStrategy[F[_], Out: AES](implicit F: Sync[F]): IvGen[F, Out] =
699[warn] | ^
700[warn] | unused implicit parameter
701[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:169:45
702[warn] 169 | implicit def noModeProcess[A: BlockCipher]: IvProcess[A, NoMode, NoPadding] =
703[warn] | ^
704[warn] | unused implicit parameter
705[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:208:41
706[warn] 208 | )(implicit spec: IvProcess[A, M, P], blockCipher: BlockCipher[A]): Either[CipherTextError, CipherText[A]] =
707[warn] | ^^^^^^^^^^^
708[warn] | unused implicit parameter
709[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/primitive/JCAAEADPrimitive.scala:8:23
710[warn] 8 |import cats.syntax.all._
711[warn] | ^
712[warn] | unused import
713[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/primitive/JCAPrimitiveCipher.scala:7:23
714[warn] 7 |import cats.syntax.all._
715[warn] | ^
716[warn] | unused import
717[info] [patched file /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/primitive/JCAAEADPrimitive.scala]
718[info] [patched file /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala]
719[info] [patched file /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/primitive/JCAPrimitiveCipher.scala]
720[warn] 8 warnings found
721[info] done compiling
722[info] compiling 3 Scala sources to /build/repo/cipher-symmetric/target/scala-3.7.4/classes ...
723[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:47:61
724[warn] 47 | private[tsec] def standardProcess[A, M, P: SymmetricPadding](
725[warn] | ^
726[warn] | unused implicit parameter
727[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:105:42
728[warn] 105 | implicit def ecbProcess[A: BlockCipher]: IvProcess[A, ECB, NoPadding] =
729[warn] | ^
730[warn] | unused implicit parameter
731[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:130:40
732[warn] 130 | implicit def gcmProcess[A](implicit aes: AES[A]): IvProcess[A, GCM, NoPadding] =
733[warn] | ^^^
734[warn] | unused implicit parameter
735[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:151:39
736[warn] 151 | def randomIVStrategy[F[_], Out: AES](implicit F: Sync[F]): IvGen[F, Out] =
737[warn] | ^
738[warn] | unused implicit parameter
739[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:169:45
740[warn] 169 | implicit def noModeProcess[A: BlockCipher]: IvProcess[A, NoMode, NoPadding] =
741[warn] | ^
742[warn] | unused implicit parameter
743[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:208:41
744[warn] 208 | )(implicit spec: IvProcess[A, M, P], blockCipher: BlockCipher[A]): Either[CipherTextError, CipherText[A]] =
745[warn] | ^^^^^^^^^^^
746[warn] | unused implicit parameter
747[warn] 6 warnings found
748[info] done compiling
749[info] compiling 2 Scala sources to /build/repo/cipher-symmetric/target/scala-3.7.4/test-classes ...
750[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:66:10
751[warn] 66 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
752[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
753[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
754[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:147:10
755[warn] 147 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
756[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
757[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
758[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:162:10
759[warn] 162 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
760[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
761[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
762[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:216:10
763[warn] 216 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
764[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
765[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
766[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:231:10
767[warn] 231 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
768[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
769[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
770[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:19:6
771[warn] 19 | ivProcess: IvProcess[A, M, P],
772[warn] | ^^^^^^^^^
773[warn] | unused implicit parameter
774[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:84:6
775[warn] 84 | aead: AEADCipher[A],
776[warn] | ^^^^
777[warn] | unused implicit parameter
778[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:87:6
779[warn] 87 | ivProcess: IvProcess[A, M, P],
780[warn] | ^^^^^^^^^
781[warn] | unused implicit parameter
782[info] [patched file /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala]
783[warn] 8 warnings found
784[info] done compiling
785[info] compiling 1 Scala source to /build/repo/cipher-symmetric/target/scala-3.7.4/test-classes ...
786[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:66:10
787[warn] 66 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
788[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
789[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
790[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:147:10
791[warn] 147 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
792[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
793[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
794[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:162:10
795[warn] 162 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
796[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
797[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
798[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:216:10
799[warn] 216 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
800[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
801[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
802[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:231:10
803[warn] 231 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
804[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
805[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
806[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:19:6
807[warn] 19 | ivProcess: IvProcess[A, M, P],
808[warn] | ^^^^^^^^^
809[warn] | unused implicit parameter
810[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:84:6
811[warn] 84 | aead: AEADCipher[A],
812[warn] | ^^^^
813[warn] | unused implicit parameter
814[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:87:6
815[warn] 87 | ivProcess: IvProcess[A, M, P],
816[warn] | ^^^^^^^^^
817[warn] | unused implicit parameter
818[warn] 8 warnings found
819[info] done compiling
820Starting build for ProjectRef(file:/build/repo/,tsec-hash-bouncy) (tsec-hash-bouncy)... [9/14]
821Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, -java-output-version, 8, -rewrite, -Wconf:msg=can be rewritten automatically under:s, -source:3.5-migration
822[info] compiling 3 Scala sources to /build/repo/hashing-bouncy/target/scala-3.7.4/classes ...
823[info] done compiling
824[info] compiling 1 Scala source to /build/repo/hashing-bouncy/target/scala-3.7.4/test-classes ...
825[warn] -- [E198] Unused Symbol Warning: /build/repo/hashing-bouncy/src/test/scala/tsec/hashing/bouncy/HasherTest.scala:10:21
826[warn] 10 |import tsec.hashing.{CryptoHashAPI, CryptoHasher}
827[warn] | ^^^^^^^^^^^^^
828[warn] | unused import
829[info] [patched file /build/repo/hashing-bouncy/src/test/scala/tsec/hashing/bouncy/HasherTest.scala]
830[warn] one warning found
831[info] done compiling
832[info] compiling 1 Scala source to /build/repo/hashing-bouncy/target/scala-3.7.4/test-classes ...
833[info] done compiling
834Starting build for ProjectRef(file:/build/repo/,tsec-http4s) (tsec-http4s)... [10/14]
835Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, -java-output-version, 8, -rewrite, -Wconf:msg=can be rewritten automatically under:s, -source:3.5-migration
836[info] compiling 4 Scala sources to /build/repo/message-digests/target/scala-3.7.4/classes ...
837[info] done compiling
838[info] compiling 27 Scala sources to /build/repo/tsec-http4s/target/scala-3.7.4/classes ...
839[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/authentication/SecuredRequestHandler.scala:6:17
840[warn] 6 |import org.log4s._
841[warn] | ^
842[warn] | unused import
843[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/authentication/package.scala:76:8
844[warn] 76 | onNotAuthenticated: Request[F] => F[Response[F]]
845[warn] | ^^^^^^^^^^^^^^^^^^
846[warn] | unused explicit parameter
847[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/authentication/package.scala:160:8
848[warn] 160 | unused: SecuredRequest[F, I, A]
849[warn] | ^^^^^^
850[warn] | unused explicit parameter
851[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/authentication/package.scala:259:36
852[warn] 259 | def extractBearerToken[F[_]: Monad](request: Request[F]): Option[String] =
853[warn] | ^
854[warn] | unused implicit parameter
855[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/authorization/BasicRBAC.scala:37:33
856[warn] 37 | def fromGroup[F[_], R: ClassTag, U, Auth](valueSet: AuthGroup[R])(
857[warn] | ^
858[warn] | unused implicit parameter
859[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/authorization/package.scala:14:39
860[warn] 14 | private def unsafeApply[G: ClassTag](array: Array[G]) = array.asInstanceOf[AuthGroup[G]]
861[warn] | ^
862[warn] | unused implicit parameter
863[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/cookies/AEADCookieEncryptor.scala:30:6
864[warn] 30 | ivStrat: IvGen[F, A]
865[warn] | ^^^^^^^
866[warn] | unused implicit parameter
867[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/cookies/package.scala:5:26
868[warn] 5 |import cats.syntax.either._
869[warn] | ^
870[warn] | unused import
871[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/cookies/package.scala:32:15
872[warn] 32 | )(implicit encryptor: AADEncryptor[F, A, SecretKey]): Either[CipherTextError, CipherText[A]] = {
873[warn] | ^^^^^^^^^
874[warn] | unused implicit parameter
875[info] [patched file /build/repo/tsec-http4s/src/main/scala/tsec/authorization/BasicRBAC.scala]
876[info] [patched file /build/repo/tsec-http4s/src/main/scala/tsec/authentication/SecuredRequestHandler.scala]
877[info] [patched file /build/repo/tsec-http4s/src/main/scala/tsec/cookies/package.scala]
878[warn] 9 warnings found
879[info] done compiling
880[info] compiling 3 Scala sources to /build/repo/tsec-http4s/target/scala-3.7.4/classes ...
881[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/authorization/BasicRBAC.scala:37:33
882[warn] 37 | def fromGroup[F[_], R: ClassTag, U, Auth](valueSet: AuthGroup[R])(
883[warn] | ^
884[warn] | unused implicit parameter
885[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/cookies/package.scala:31:15
886[warn] 31 | )(implicit encryptor: AADEncryptor[F, A, SecretKey]): Either[CipherTextError, CipherText[A]] = {
887[warn] | ^^^^^^^^^
888[warn] | unused implicit parameter
889[warn] two warnings found
890[info] done compiling
891[info] compiling 14 Scala sources to /build/repo/tsec-http4s/target/scala-3.7.4/test-classes ...
892[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/test/scala/tsec/CookieSignerTests.scala:9:26
893[warn] 9 |import cats.syntax.either._
894[warn] | ^
895[warn] | unused import
896[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/test/scala/tsec/authentication/AuthenticatorSpec.scala:80:40
897[warn] 80 | def errorToNone[F[_]: Applicative, A](t: Throwable): OptionT[F, A] =
898[warn] | ^
899[warn] | unused explicit parameter
900[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/test/scala/tsec/authentication/AuthenticatorSpec.scala:106:8
901[warn] 106 | def dAll(): Unit = storageMap.clear()
902[warn] | ^^^^
903[warn] | unused private member
904[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/test/scala/tsec/authentication/AuthenticatorSpec.scala:302:16
905[warn] 302 | forAll { (dummy1: DummyUser) =>
906[warn] | ^^^^^^
907[warn] | unused explicit parameter
908[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/test/scala/tsec/authentication/AuthorizationTests.scala:6:46
909[warn] 6 |import org.scalatest.matchers.should.Matchers._
910[warn] | ^
911[warn] | unused import
912[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/test/scala/tsec/authentication/EncryptedCookieAuthenticatorSpec.scala:30:43
913[warn] 30 | implicit def cookieBackingStore[A: AESGCM]: BackingStore[IO, UUID, AuthEncryptedCookie[A, Int]] =
914[warn] | ^
915[warn] | unused implicit parameter
916[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/test/scala/tsec/authentication/EncryptedCookieAuthenticatorSpec.scala:102:10
917[warn] 102 | def extractFromResponse(response: Response[IO]): OptionT[IO, AuthEncryptedCookie[A, Int]] = {
918[warn] | ^^^^^^^^^^^^^^^^^^^
919[warn] | unused private member
920[info] [patched file /build/repo/tsec-http4s/src/test/scala/tsec/authentication/RequestAuthenticatorSpec.scala]
921[info] [patched file /build/repo/tsec-http4s/src/test/scala/tsec/CookieSignerTests.scala]
922[info] [patched file /build/repo/tsec-http4s/src/test/scala/tsec/AEADCookieSignerTest.scala]
923[info] [patched file /build/repo/tsec-http4s/src/test/scala/tsec/authentication/AuthorizationTests.scala]
924[info] [patched file /build/repo/tsec-http4s/src/test/scala/tsec/authentication/TSecAuthServiceTests.scala]
925[warn] 7 warnings found
926[info] done compiling
927[info] compiling 5 Scala sources to /build/repo/tsec-http4s/target/scala-3.7.4/test-classes ...
928[info] done compiling
929Starting build for ProjectRef(file:/build/repo/,tsec-hash-jca) (tsec-hash-jca)... [11/14]
930Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, -java-output-version, 8, -rewrite, -Wconf:msg=can be rewritten automatically under:s, -source:3.5-migration
931[info] compiling 1 Scala source to /build/repo/message-digests/target/scala-3.7.4/test-classes ...
932[info] done compiling
933Starting build for ProjectRef(file:/build/repo/,tsec-bouncy) (tsec-bouncy)... [12/14]
934Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, -java-output-version, 8, -rewrite, -Wconf:msg=can be rewritten automatically under:s, -source:3.5-migration
935Starting build for ProjectRef(file:/build/repo/,tsec-jwt-sig) (tsec-jwt-sig)... [13/14]
936Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, -java-output-version, 8, -rewrite, -Wconf:msg=can be rewritten automatically under:s, -source:3.5-migration
937[info] compiling 4 Scala sources to /build/repo/jwt-sig/target/scala-3.7.4/classes ...
938[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWSSigCV.scala:26:20
939[warn] 26 | private[this] def base64UrlSafe(s: String): Either[GeneralSignatureError, Array[Byte]] =
940[warn] | ^^^^^^^^^^^^^
941[warn] | unused private member
942[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWSSignedHeader.scala:4:26
943[warn] 4 |import cats.syntax.either._
944[warn] | ^
945[warn] | unused import
946[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWSSignedHeader.scala:12:13
947[warn] 12 |import tsec.{hashing, jwt}
948[warn] | ^^^^^^^
949[warn] | unused import
950[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWSSignedHeader.scala:30:36
951[warn] 30 | implicit def encoder[A: JWTSigAlgo]: Encoder[JWSSignedHeader[A]] = new Encoder[JWSSignedHeader[A]] {
952[warn] | ^
953[warn] | unused implicit parameter
954[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWSSignedHeader.scala:97:44
955[warn] 97 | implicit def genDeserializer[A: JWTSigAlgo](
956[warn] | ^
957[warn] | unused implicit parameter
958[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:22:29
959[warn] 22 | def signAndBuild[F[_]: Sync, A: JWTSigAlgo](
960[warn] | ^
961[warn] | unused implicit parameter
962[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:27:29
963[warn] 27 | def signAndBuild[F[_]: Sync, A: JWTSigAlgo](
964[warn] | ^
965[warn] | unused implicit parameter
966[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:27:44
967[warn] 27 | def signAndBuild[F[_]: Sync, A: JWTSigAlgo](
968[warn] | ^
969[warn] | unused implicit parameter
970[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:33:29
971[warn] 33 | def signToString[F[_]: Sync, A: JWTSigAlgo](
972[warn] | ^
973[warn] | unused implicit parameter
974[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:38:29
975[warn] 38 | def signToString[F[_]: Sync, A: JWTSigAlgo](
976[warn] | ^
977[warn] | unused implicit parameter
978[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:38:44
979[warn] 38 | def signToString[F[_]: Sync, A: JWTSigAlgo](
980[warn] | ^
981[warn] | unused implicit parameter
982[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:44:33
983[warn] 44 | def verifyK[F[_], A: JWTSigAlgo](
984[warn] | ^
985[warn] | unused implicit parameter
986[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:50:33
987[warn] 50 | def verifyC[F[_], A: JWTSigAlgo](
988[warn] | ^
989[warn] | unused implicit parameter
990[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:76:32
991[warn] 76 | def signAndBuild[A: JWTSigAlgo](header: JWSSignedHeader[A], body: JWTClaims, sigPrivateKey: SigPrivateKey[A])(
992[warn] | ^
993[warn] | unused implicit parameter
994[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:80:32
995[warn] 80 | def signToString[A: JWTSigAlgo](header: JWSSignedHeader[A], body: JWTClaims, sigPrivateKey: SigPrivateKey[A])(
996[warn] | ^
997[warn] | unused implicit parameter
998[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:88:27
999[warn] 88 | def verifyK[A: JWTSigAlgo](
1000[warn] | ^
1001[warn] | unused implicit parameter
1002[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:93:27
1003[warn] 93 | def verifyC[A: JWTSigAlgo](
1004[warn] | ^
1005[warn] | unused implicit parameter
1006[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/UnverifiedJWTSig.scala:14:47
1007[warn] 14 |final case class UnverifiedJWTSig[A: JWTSigAlgo](
1008[warn] | ^
1009[warn] | unused implicit parameter
1010[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/UnverifiedJWTSig.scala:24:36
1011[warn] 24 | def unverified[F[_], A: JWTSigAlgo](jwt: String)(implicit F: Sync[F], sigCV: JWSSigCV[F, A]): F[UnverifiedJWTSig[A]] =
1012[warn] | ^
1013[warn] | unused implicit parameter
1014[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/UnverifiedJWTSig.scala:24:60
1015[warn] 24 | def unverified[F[_], A: JWTSigAlgo](jwt: String)(implicit F: Sync[F], sigCV: JWSSigCV[F, A]): F[UnverifiedJWTSig[A]] =
1016[warn] | ^
1017[warn] | unused implicit parameter
1018[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/UnverifiedJWTSig.scala:27:33
1019[warn] 27 | def verifyK[F[_], A: JWTSigAlgo](
1020[warn] | ^
1021[warn] | unused implicit parameter
1022[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/UnverifiedJWTSig.scala:33:33
1023[warn] 33 | def verifyC[F[_], A: JWTSigAlgo](
1024[warn] | ^
1025[warn] | unused implicit parameter
1026[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/UnverifiedJWTSig.scala:41:30
1027[warn] 41 | def unverified[A: JWTSigAlgo](jwt: String)(implicit sigCV: JWSSigCV[SigErrorM, A]): SigErrorM[UnverifiedJWTSig[A]] =
1028[warn] | ^
1029[warn] | unused implicit parameter
1030[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/UnverifiedJWTSig.scala:44:27
1031[warn] 44 | def verifyK[A: JWTSigAlgo](
1032[warn] | ^
1033[warn] | unused implicit parameter
1034[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/UnverifiedJWTSig.scala:50:27
1035[warn] 50 | def verifyC[A: JWTSigAlgo](
1036[warn] | ^
1037[warn] | unused implicit parameter
1038[info] [patched file /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWSSignedHeader.scala]
1039[info] [patched file /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWSSigCV.scala]
1040[warn] 25 warnings found
1041[info] done compiling
1042[info] compiling 2 Scala sources to /build/repo/jwt-sig/target/scala-3.7.4/classes ...
1043[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWSSigCV.scala:26:14
1044[warn] 26 | private def base64UrlSafe(s: String): Either[GeneralSignatureError, Array[Byte]] =
1045[warn] | ^^^^^^^^^^^^^
1046[warn] | unused private member
1047[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWSSignedHeader.scala:29:36
1048[warn] 29 | implicit def encoder[A: JWTSigAlgo]: Encoder[JWSSignedHeader[A]] = new Encoder[JWSSignedHeader[A]] {
1049[warn] | ^
1050[warn] | unused implicit parameter
1051[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWSSignedHeader.scala:96:44
1052[warn] 96 | implicit def genDeserializer[A: JWTSigAlgo](
1053[warn] | ^
1054[warn] | unused implicit parameter
1055[warn] three warnings found
1056[info] done compiling
1057[info] compiling 1 Scala source to /build/repo/jwt-sig/target/scala-3.7.4/test-classes ...
1058[warn] -- [E175] Potential Issue Warning: /build/repo/jwt-sig/src/test/scala/tsec/JWTSigTests.scala:19:24
1059[warn] 19 | Security.addProvider(new BouncyCastleProvider())
1060[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1061[warn] | discarded non-Unit value of type Int. Add `: Unit` to discard silently.
1062[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/test/scala/tsec/JWTSigTests.scala:7:26
1063[warn] 7 |import cats.syntax.either._
1064[warn] | ^
1065[warn] | unused import
1066[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/test/scala/tsec/JWTSigTests.scala:9:35
1067[warn] 9 |import org.scalatest.matchers.must.Matchers
1068[warn] | ^^^^^^^^
1069[warn] | unused import
1070[info] [patched file /build/repo/jwt-sig/src/test/scala/tsec/JWTSigTests.scala]
1071[warn] three warnings found
1072[info] done compiling
1073[info] compiling 1 Scala source to /build/repo/jwt-sig/target/scala-3.7.4/test-classes ...
1074[warn] -- [E175] Potential Issue Warning: /build/repo/jwt-sig/src/test/scala/tsec/JWTSigTests.scala:17:24
1075[warn] 17 | Security.addProvider(new BouncyCastleProvider())
1076[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1077[warn] | discarded non-Unit value of type Int. Add `: Unit` to discard silently.
1078[warn] one warning found
1079[info] done compiling
1080
1081************************
1082Build summary:
1083[{
1084 "module": "tsec-cipher-core",
1085 "compile": {"status": "ok", "tookMs": 9127, "warnings": 0, "errors": 0, "sourceVersion": "3.5-migration"},
1086 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
1087 "test-compile": {"status": "ok", "tookMs": 5432, "warnings": 0, "errors": 0, "sourceVersion": "3.5-migration"},
1088 "test": {"status": "skipped", "tookMs": 0, "passed": 0, "failed": 0, "ignored": 0, "skipped": 0, "total": 0, "byFramework": []},
1089 "publish": {"status": "skipped", "tookMs": 0},
1090 "metadata": {
1091 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
1092}
1093},{
1094 "module": "tsec-jwt-core",
1095 "compile": {"status": "ok", "tookMs": 5574, "warnings": 8, "errors": 0, "sourceVersion": "3.5-migration"},
1096 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
1097 "test-compile": {"status": "ok", "tookMs": 3444, "warnings": 1, "errors": 0, "sourceVersion": "3.5-migration"},
1098 "test": {"status": "skipped", "tookMs": 0, "passed": 0, "failed": 0, "ignored": 0, "skipped": 0, "total": 0, "byFramework": []},
1099 "publish": {"status": "skipped", "tookMs": 0},
1100 "metadata": {
1101 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
1102}
1103},{
1104 "module": "tsec-jwt-mac",
1105 "compile": {"status": "ok", "tookMs": 2051, "warnings": 26, "errors": 0, "sourceVersion": "3.5-migration"},
1106 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
1107 "test-compile": {"status": "ok", "tookMs": 3541, "warnings": 1, "errors": 0, "sourceVersion": "3.5-migration"},
1108 "test": {"status": "skipped", "tookMs": 0, "passed": 0, "failed": 0, "ignored": 0, "skipped": 0, "total": 0, "byFramework": []},
1109 "publish": {"status": "skipped", "tookMs": 0},
1110 "metadata": {
1111 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
1112}
1113},{
1114 "module": "tsec-mac",
1115 "compile": {"status": "ok", "tookMs": 93, "warnings": 1, "errors": 0, "sourceVersion": "3.5-migration"},
1116 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
1117 "test-compile": {"status": "ok", "tookMs": 1103, "warnings": 0, "errors": 0, "sourceVersion": "3.5-migration"},
1118 "test": {"status": "skipped", "tookMs": 0, "passed": 0, "failed": 0, "ignored": 0, "skipped": 0, "total": 0, "byFramework": []},
1119 "publish": {"status": "skipped", "tookMs": 0},
1120 "metadata": {
1121 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
1122}
1123},{
1124 "module": "tsec-cipher-bouncy",
1125 "compile": {"status": "ok", "tookMs": 1079, "warnings": 3, "errors": 0, "sourceVersion": "3.5-migration"},
1126 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
1127 "test-compile": {"status": "ok", "tookMs": 1148, "warnings": 0, "errors": 0, "sourceVersion": "3.5-migration"},
1128 "test": {"status": "skipped", "tookMs": 0, "passed": 0, "failed": 0, "ignored": 0, "skipped": 0, "total": 0, "byFramework": []},
1129 "publish": {"status": "skipped", "tookMs": 0},
1130 "metadata": {
1131 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
1132}
1133},{
1134 "module": "tsec-signatures",
1135 "compile": {"status": "ok", "tookMs": 131, "warnings": 0, "errors": 0, "sourceVersion": "3.5-migration"},
1136 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
1137 "test-compile": {"status": "ok", "tookMs": 922, "warnings": 0, "errors": 0, "sourceVersion": "3.5-migration"},
1138 "test": {"status": "skipped", "tookMs": 0, "passed": 0, "failed": 0, "ignored": 0, "skipped": 0, "total": 0, "byFramework": []},
1139 "publish": {"status": "skipped", "tookMs": 0},
1140 "metadata": {
1141 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
1142}
1143},{
1144 "module": "tsec-password",
1145 "compile": {"status": "ok", "tookMs": 890, "warnings": 0, "errors": 0, "sourceVersion": "3.5-migration"},
1146 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
1147 "test-compile": {"status": "ok", "tookMs": 1276, "warnings": 0, "errors": 0, "sourceVersion": "3.5-migration"},
1148 "test": {"status": "skipped", "tookMs": 0, "passed": 0, "failed": 0, "ignored": 0, "skipped": 0, "total": 0, "byFramework": []},
1149 "publish": {"status": "skipped", "tookMs": 0},
1150 "metadata": {
1151 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
1152}
1153},{
1154 "module": "tsec-common",
1155 "compile": {"status": "ok", "tookMs": 44, "warnings": 1, "errors": 0, "sourceVersion": "3.5-migration"},
1156 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
1157 "test-compile": {"status": "ok", "tookMs": 90, "warnings": 13, "errors": 0, "sourceVersion": "3.5-migration"},
1158 "test": {"status": "skipped", "tookMs": 0, "passed": 0, "failed": 0, "ignored": 0, "skipped": 0, "total": 0, "byFramework": []},
1159 "publish": {"status": "skipped", "tookMs": 0},
1160 "metadata": {
1161 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
1162}
1163},{
1164 "module": "tsec-cipher-jca",
1165 "compile": {"status": "ok", "tookMs": 1180, "warnings": 8, "errors": 0, "sourceVersion": "3.5-migration"},
1166 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
1167 "test-compile": {"status": "ok", "tookMs": 2222, "warnings": 8, "errors": 0, "sourceVersion": "3.5-migration"},
1168 "test": {"status": "skipped", "tookMs": 0, "passed": 0, "failed": 0, "ignored": 0, "skipped": 0, "total": 0, "byFramework": []},
1169 "publish": {"status": "skipped", "tookMs": 0},
1170 "metadata": {
1171 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
1172}
1173},{
1174 "module": "tsec-hash-bouncy",
1175 "compile": {"status": "ok", "tookMs": 445, "warnings": 0, "errors": 0, "sourceVersion": "3.5-migration"},
1176 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
1177 "test-compile": {"status": "ok", "tookMs": 1152, "warnings": 1, "errors": 0, "sourceVersion": "3.5-migration"},
1178 "test": {"status": "skipped", "tookMs": 0, "passed": 0, "failed": 0, "ignored": 0, "skipped": 0, "total": 0, "byFramework": []},
1179 "publish": {"status": "skipped", "tookMs": 0},
1180 "metadata": {
1181 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
1182}
1183},{
1184 "module": "tsec-http4s",
1185 "compile": {"status": "ok", "tookMs": 5371, "warnings": 9, "errors": 0, "sourceVersion": "3.5-migration"},
1186 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
1187 "test-compile": {"status": "ok", "tookMs": 7698, "warnings": 7, "errors": 0, "sourceVersion": "3.5-migration"},
1188 "test": {"status": "skipped", "tookMs": 0, "passed": 0, "failed": 0, "ignored": 0, "skipped": 0, "total": 0, "byFramework": []},
1189 "publish": {"status": "skipped", "tookMs": 0},
1190 "metadata": {
1191 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
1192}
1193},{
1194 "module": "tsec-hash-jca",
1195 "compile": {"status": "ok", "tookMs": 72, "warnings": 0, "errors": 0, "sourceVersion": "3.5-migration"},
1196 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
1197 "test-compile": {"status": "ok", "tookMs": 1057, "warnings": 0, "errors": 0, "sourceVersion": "3.5-migration"},
1198 "test": {"status": "skipped", "tookMs": 0, "passed": 0, "failed": 0, "ignored": 0, "skipped": 0, "total": 0, "byFramework": []},
1199 "publish": {"status": "skipped", "tookMs": 0},
1200 "metadata": {
1201 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
1202}
1203},{
1204 "module": "tsec-bouncy",
1205 "compile": {"status": "ok", "tookMs": 34, "warnings": 1, "errors": 0, "sourceVersion": "3.5-migration"},
1206 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
1207 "test-compile": {"status": "ok", "tookMs": 87, "warnings": 0, "errors": 0, "sourceVersion": "3.5-migration"},
1208 "test": {"status": "skipped", "tookMs": 0, "passed": 0, "failed": 0, "ignored": 0, "skipped": 0, "total": 0, "byFramework": []},
1209 "publish": {"status": "skipped", "tookMs": 0},
1210 "metadata": {
1211 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
1212}
1213},{
1214 "module": "tsec-jwt-sig",
1215 "compile": {"status": "ok", "tookMs": 1250, "warnings": 25, "errors": 0, "sourceVersion": "3.5-migration"},
1216 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
1217 "test-compile": {"status": "ok", "tookMs": 1926, "warnings": 3, "errors": 0, "sourceVersion": "3.5-migration"},
1218 "test": {"status": "skipped", "tookMs": 0, "passed": 0, "failed": 0, "ignored": 0, "skipped": 0, "total": 0, "byFramework": []},
1219 "publish": {"status": "skipped", "tookMs": 0},
1220 "metadata": {
1221 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
1222}
1223}]
1224************************
1225[success] Total time: 83 s (0:01:23.0), completed Jan 13, 2026, 5:20:47 PM
1226[0JChecking patch project/plugins.sbt...
1227Checking patch project/build.properties...
1228Checking patch build.sbt...
1229Applied patch project/plugins.sbt cleanly.
1230Applied patch project/build.properties cleanly.
1231Applied patch build.sbt cleanly.
1232Commit migration rewrites
1233Switched to a new branch 'opencb/migrate-source-3.5'
1234[opencb/migrate-source-3.5 81fe44d2] Apply Scala compiler rewrites using -source:3.5-migration using Scala 3.7.4
1235 28 files changed, 51 insertions(+), 68 deletions(-)
1236----
1237Preparing build for 3.8.0
1238Scala binary version found: 3.8
1239Implicitly using source version 3.8
1240Scala binary version found: 3.8
1241Implicitly using source version 3.8
1242Would try to apply common scalacOption (best-effort, sbt/mill only):
1243Append: ,REQUIRE:-source:3.8
1244Remove: ,-deprecation,-feature,-Xfatal-warnings,-Werror,MATCH:.*-Wconf.*any:e
1245
1246Try apply source patch:
1247Path: project/plugins.sbt
1248Pattern: % "0.5.3")
1249Replacement: % "0.8.3")
1250Successfully applied pattern ' % "0.5.3")' in project/plugins.sbt
1251
1252Try apply source patch:
1253Path: build.sbt
1254Pattern: ThisBuild / tlSonatypeUseLegacyHost := true
1255Replacement:
1256Successfully applied pattern 'ThisBuild / tlSonatypeUseLegacyHost := true' in build.sbt
1257----
1258Starting build for 3.8.0
1259Execute tests: true
1260sbt project found:
1261Sbt version 1.9.6 is not supported, minimal supported version is 1.11.5
1262Enforcing usage of sbt in version 1.11.5
1263No prepare script found for project davenverse/tsec
1264##################################
1265Scala version: 3.8.0
1266Targets: io.github.jmcardon%tsec-bouncy io.github.jmcardon%tsec-cipher-bouncy io.github.jmcardon%tsec-cipher-core io.github.jmcardon%tsec-cipher-jca io.github.jmcardon%tsec-common io.github.jmcardon%tsec-hash-bouncy io.github.jmcardon%tsec-hash-jca io.github.jmcardon%tsec-http4s io.github.jmcardon%tsec-jwt-core io.github.jmcardon%tsec-jwt-mac io.github.jmcardon%tsec-jwt-sig io.github.jmcardon%tsec-mac io.github.jmcardon%tsec-password io.github.jmcardon%tsec-signatures
1267Project projectConfig: {"projects":{"exclude":[],"overrides":{}},"java":{"version":"17"},"sbt":{"commands":[],"options":[]},"mill":{"options":[]},"tests":"full","migrationVersions":["3.5"],"sourcePatches":[{"path":"project/plugins.sbt","pattern":" % \"0.5.3\")","replaceWith":" % \"0.8.3\")"},{"path":"build.sbt","pattern":"ThisBuild / tlSonatypeUseLegacyHost := true","replaceWith":""}]}
1268##################################
1269Using extra scalacOptions: ,REQUIRE:-source:3.8
1270Filtering out scalacOptions: ,-deprecation,-feature,-Xfatal-warnings,-Werror,MATCH:.*-Wconf.*any:e
1271[sbt_options] declare -a sbt_options=()
1272[process_args] java_version = '17'
1273[copyRt] java9_rt = '/root/.sbt/1.0/java9-rt-ext-eclipse_adoptium_17_0_8/rt.jar'
1274# Executing command line:
1275java
1276-Dfile.encoding=UTF8
1277-Xms1G
1278-Xmx6G
1279-XX:ReservedCodeCacheSize=250M
1280-XX:+TieredCompilation
1281-XX:+UseG1GC
1282-Dcommunitybuild.scala=3.8.0
1283-Dcommunitybuild.project.dependencies.add=
1284-Xmx7G
1285-Xms4G
1286-Xss8M
1287-Dsbt.script=/root/.sdkman/candidates/sbt/current/bin/sbt
1288-Dscala.ext.dirs=/root/.sbt/1.0/java9-rt-ext-eclipse_adoptium_17_0_8
1289-jar
1290/root/.sdkman/candidates/sbt/1.11.5/bin/sbt-launch.jar
1291"setCrossScalaVersions 3.8.0"
1292"++3.8.0 -v"
1293"mapScalacOptions ",REQUIRE:-source:3.8,-Wconf:msg=can be rewritten automatically under:s" ",-deprecation,-feature,-Xfatal-warnings,-Werror,MATCH:.*-Wconf.*any:e""
1294"set every credentials := Nil"
1295"excludeLibraryDependency com.github.ghik:zerowaste_{scalaVersion} com.olegpy:better-monadic-for_3 org.polyvariant:better-tostring_{scalaVersion} org.wartremover:wartremover_{scalaVersion}"
1296"removeScalacOptionsStartingWith -P:wartremover"
1297
1298moduleMappings
1299"runBuild 3.8.0 """{"projects":{"exclude":[],"overrides":{}},"java":{"version":"17"},"sbt":{"commands":[],"options":[]},"mill":{"options":[]},"tests":"full","migrationVersions":["3.5"],"sourcePatches":[{"path":"project/plugins.sbt","pattern":" % \"0.5.3\")","replaceWith":" % \"0.8.3\")"},{"path":"build.sbt","pattern":"ThisBuild / tlSonatypeUseLegacyHost := true","replaceWith":""}]}""" io.github.jmcardon%tsec-bouncy io.github.jmcardon%tsec-cipher-bouncy io.github.jmcardon%tsec-cipher-core io.github.jmcardon%tsec-cipher-jca io.github.jmcardon%tsec-common io.github.jmcardon%tsec-hash-bouncy io.github.jmcardon%tsec-hash-jca io.github.jmcardon%tsec-http4s io.github.jmcardon%tsec-jwt-core io.github.jmcardon%tsec-jwt-mac io.github.jmcardon%tsec-jwt-sig io.github.jmcardon%tsec-mac io.github.jmcardon%tsec-password io.github.jmcardon%tsec-signatures"
1300
1301[info] welcome to sbt 1.11.5 (Eclipse Adoptium Java 17.0.8)
1302[info] loading project definition from /build/repo/project/project
1303[info] loading settings for project repo-build from akka.sbt, plugins.sbt...
1304[info] loading project definition from /build/repo/project
1305[info] loading settings for project root from build.sbt...
1306[info] resolving key references (25243 settings) ...
1307[info] set scmInfo to https://github.com/davenverse/tsec
1308[info] set current project to root (in build file:/build/repo/)
1309Execute setCrossScalaVersions: 3.8.0
1310OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-libsodium/crossScalaVersions
1311OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-bouncy/crossScalaVersions
1312OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in rootJVM/crossScalaVersions
1313OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-jwt-mac/crossScalaVersions
1314[info] set scmInfo to https://github.com/davenverse/tsec
1315OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-cipher-core/crossScalaVersions
1316OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-cipher-jca/crossScalaVersions
1317OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-cipher-bouncy/crossScalaVersions
1318OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-jwt-core/crossScalaVersions
1319OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in rootNative/crossScalaVersions
1320OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-http4s/crossScalaVersions
1321OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in rootJS/crossScalaVersions
1322OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-signatures/crossScalaVersions
1323OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-mac/crossScalaVersions
1324OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-common/crossScalaVersions
1325OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-examples/crossScalaVersions
1326OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-hash-jca/crossScalaVersions
1327OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-bench/crossScalaVersions
1328OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-hash-bouncy/crossScalaVersions
1329OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-jwt-sig/crossScalaVersions
1330OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in root/crossScalaVersions
1331OpenCB::Limitting incorrect crossVersions List() -> List(3.8.0) in root/crossScalaVersions
1332OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-password/crossScalaVersions
1333OpenCB::Changing crossVersion 3.3.0 -> 3.8.0 in tsec-oauth2/crossScalaVersions
1334[info] set current project to root (in build file:/build/repo/)
1335[info] Setting Scala version to 3.8.0 on 22 projects.
1336[info] Switching Scala version on:
1337[info] tsec-bouncy (2.12.18, 2.13.12, 3.8.0)
1338[info] tsec-password (2.12.18, 2.13.12, 3.8.0)
1339[info] * root (3.8.0)
1340[info] rootJS (2.12.18, 2.13.12, 3.8.0)
1341[info] tsec-bench (2.12.18, 2.13.12, 3.8.0)
1342[info] tsec-mac (2.12.18, 2.13.12, 3.8.0)
1343[info] tsec-examples (2.12.18, 2.13.12, 3.8.0)
1344[info] tsec-oauth2 (2.12.18, 2.13.12, 3.8.0)
1345[info] tsec-cipher-jca (2.12.18, 2.13.12, 3.8.0)
1346[info] tsec-hash-bouncy (2.12.18, 2.13.12, 3.8.0)
1347[info] tsec-cipher-bouncy (2.12.18, 2.13.12, 3.8.0)
1348[info] tsec-jwt-core (2.12.18, 2.13.12, 3.8.0)
1349[info] rootJVM (2.12.18, 2.13.12, 3.8.0)
1350[info] rootNative (2.12.18, 2.13.12, 3.8.0)
1351[info] tsec-cipher-core (2.12.18, 2.13.12, 3.8.0)
1352[info] tsec-jwt-sig (2.12.18, 2.13.12, 3.8.0)
1353[info] tsec-libsodium (2.12.18, 2.13.12, 3.8.0)
1354[info] tsec-http4s (2.12.18, 2.13.12, 3.8.0)
1355[info] tsec-common (2.12.18, 2.13.12, 3.8.0)
1356[info] tsec-jwt-mac (2.12.18, 2.13.12, 3.8.0)
1357[info] tsec-hash-jca (2.12.18, 2.13.12, 3.8.0)
1358[info] tsec-signatures (2.12.18, 2.13.12, 3.8.0)
1359[info] Excluding projects:
1360[info] Reapplying settings...
1361[info] set scmInfo to https://github.com/davenverse/tsec
1362[info] set current project to root (in build file:/build/repo/)
1363Execute mapScalacOptions: ,REQUIRE:-source:3.8,-Wconf:msg=can be rewritten automatically under:s ,-deprecation,-feature,-Xfatal-warnings,-Werror,MATCH:.*-Wconf.*any:e
1364[info] Reapplying settings...
1365[info] set scmInfo to https://github.com/davenverse/tsec
1366[info] set current project to root (in build file:/build/repo/)
1367[info] Defining Global / credentials, credentials and 20 others.
1368[info] The new values will be used by Compile / scalafmtOnly, IntegrationTest / scalafmtOnly and 196 others.
1369[info] Run `last` for details.
1370[info] Reapplying settings...
1371[info] set scmInfo to https://github.com/davenverse/tsec
1372[info] set current project to root (in build file:/build/repo/)
1373Execute excludeLibraryDependency: com.github.ghik:zerowaste_{scalaVersion} com.olegpy:better-monadic-for_3 org.polyvariant:better-tostring_{scalaVersion} org.wartremover:wartremover_{scalaVersion}
1374[info] Reapplying settings...
1375OpenCB::Failed to reapply settings in excludeLibraryDependency: Reference to undefined setting:
1376
1377 Global / allExcludeDependencies from Global / allExcludeDependencies (CommunityBuildPlugin.scala:331)
1378 Did you mean rootJVM / allExcludeDependencies ?
1379 , retry without global scopes
1380[info] Reapplying settings...
1381[info] set scmInfo to https://github.com/davenverse/tsec
1382[info] set current project to root (in build file:/build/repo/)
1383Execute removeScalacOptionsStartingWith: -P:wartremover
1384[info] Reapplying settings...
1385[info] set scmInfo to https://github.com/davenverse/tsec
1386[info] set current project to root (in build file:/build/repo/)
1387[success] Total time: 0 s, completed Jan 13, 2026, 5:21:10 PM
1388Build config: {"projects":{"exclude":[],"overrides":{}},"java":{"version":"17"},"sbt":{"commands":[],"options":[]},"mill":{"options":[]},"tests":"full","migrationVersions":["3.5"],"sourcePatches":[{"path":"project/plugins.sbt","pattern":" % \"0.5.3\")","replaceWith":" % \"0.8.3\")"},{"path":"build.sbt","pattern":"ThisBuild / tlSonatypeUseLegacyHost := true","replaceWith":""}]}
1389Parsed config: Success(ProjectBuildConfig(ProjectsConfig(List(),Map()),Full,List()))
1390Starting build...
1391Projects: Set(tsec-bouncy, tsec-password, tsec-mac, tsec-cipher-jca, tsec-hash-bouncy, tsec-cipher-bouncy, tsec-jwt-core, tsec-cipher-core, tsec-jwt-sig, tsec-http4s, tsec-common, tsec-jwt-mac, tsec-hash-jca, tsec-signatures)
1392Starting build for ProjectRef(file:/build/repo/,tsec-cipher-core) (tsec-cipher-core)... [0/14]
1393OpenCB::Exclude Scala3 specific scalacOption `REQUIRE:-source:3.8` in Scala 2.12.20 module Global
1394OpenCB::Filter out '-deprecation', matches setting pattern '^-?-deprecation'
1395OpenCB::Filter out '-feature', matches setting pattern '^-?-feature'
1396Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, --java-output-version:17, -Wconf:msg=can be rewritten automatically under:s, -source:3.8
1397[info] compiling 34 Scala sources to /build/repo/common/target/scala-3.8.0/classes ...
1398[warn] -- Warning: /build/repo/common/src/main/scala/tsec/common/CanCatch.scala:1:13 --
1399[warn] 1 |package tsec.common
1400[warn] |^^^^^^^^^^^^^^^^^^^
1401[warn] |No class, trait or object is defined in the compilation unit.
1402[warn] |The incremental compiler cannot record the dependency information in such case.
1403[warn] |Some errors like unused import referring to a non-existent class might not be reported.
1404[warn] there was 1 deprecation warning; re-run with -deprecation for details
1405[warn] two warnings found
1406[info] done compiling
1407[info] compiling 9 Scala sources to /build/repo/cipher-core/target/scala-3.8.0/classes ...
1408[info] done compiling
1409[info] compiling 3 Scala sources to /build/repo/common/target/scala-3.8.0/test-classes ...
1410[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:47:10
1411[warn] 47 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
1412[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1413[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1414[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:84:10
1415[warn] 84 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
1416[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1417[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1418[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:98:10
1419[warn] 98 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
1420[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1421[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1422[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:112:10
1423[warn] 112 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
1424[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1425[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1426[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:126:10
1427[warn] 126 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
1428[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1429[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1430[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:162:10
1431[warn] 162 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
1432[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1433[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1434[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:176:10
1435[warn] 176 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
1436[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1437[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1438[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:190:10
1439[warn] 190 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
1440[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1441[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1442[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:205:10
1443[warn] 205 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
1444[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1445[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1446[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:219:10
1447[warn] 219 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
1448[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1449[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1450[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:233:10
1451[warn] 233 | testEncryptionDecryption.attempt.unsafeRunSync() must equal(Right(testMessage))
1452[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1453[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1454[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:247:10
1455[warn] 247 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
1456[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1457[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1458[warn] -- [E175] Potential Issue Warning: /build/repo/common/src/test/scala/tsec/SymmetricSpec.scala:262:10
1459[warn] 262 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
1460[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1461[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1462[warn] 13 warnings found
1463[info] done compiling
1464Starting build for ProjectRef(file:/build/repo/,tsec-jwt-core) (tsec-jwt-core)... [1/14]
1465Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, --java-output-version:17, -Wconf:msg=can be rewritten automatically under:s, -source:3.8
1466[info] compiling 1 Scala source to /build/repo/bouncycastle/target/scala-3.8.0/classes ...
1467[info] compiling 6 Scala sources to /build/repo/mac/target/scala-3.8.0/classes ...
1468[warn] -- [E175] Potential Issue Warning: /build/repo/bouncycastle/src/main/scala/tsec/Bouncy.scala:13:26
1469[warn] 13 | Security.addProvider(new BouncyCastleProvider())
1470[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1471[warn] | discarded non-Unit value of type Int. Add `: Unit` to discard silently.
1472[warn] one warning found
1473[info] done compiling
1474[info] compiling 11 Scala sources to /build/repo/signatures/target/scala-3.8.0/classes ...
1475[warn] -- [E198] Unused Symbol Warning: /build/repo/mac/src/main/scala/tsec/mac/jca/WithMacSigningKey.scala:12:66
1476[warn] 12 |protected[tsec] abstract class WithMacSigningKey[A](algo: String, keyLenBits: Int)
1477[warn] | ^^^^^^^^^^
1478[warn] | unused explicit parameter
1479[warn] one warning found
1480[info] done compiling
1481[info] done compiling
1482[info] compiling 10 Scala sources and 1 Java source to /build/repo/jwt-core/target/scala-3.8.0/classes ...
1483[warn] -- [E175] Potential Issue Warning: /build/repo/jwt-core/src/main/scala/tsec/jwt/util/ParseEncodedKeySpec.scala:36:19
1484[warn] 36 | me.raiseError(GeneralSignatureError("Invalid ECDSA signature format"))
1485[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1486[warn] |discarded non-Unit value of type F[Any]. Add `: Unit` to discard silently.
1487[warn] |
1488[warn] |where: F is a type in method derToConcat with bounds <: [_] =>> Any
1489[warn] -- [E175] Potential Issue Warning: /build/repo/jwt-core/src/main/scala/tsec/jwt/util/ParseEncodedKeySpec.scala:61:19
1490[warn] 61 | me.raiseError(GeneralSignatureError("Invalid ECDSA signature format"))
1491[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1492[warn] |discarded non-Unit value of type F[Any]. Add `: Unit` to discard silently.
1493[warn] |
1494[warn] |where: F is a type in method derToConcat with bounds <: [_] =>> Any
1495[warn] -- [E175] Potential Issue Warning: /build/repo/jwt-core/src/main/scala/tsec/jwt/util/ParseEncodedKeySpec.scala:94:19
1496[warn] 94 | me.raiseError(GeneralSignatureError("Invalid ECDSA signature format"))
1497[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1498[warn] |discarded non-Unit value of type F[Any]. Add `: Unit` to discard silently.
1499[warn] |
1500[warn] |where: F is a type in method concatSignatureToDER with bounds <: [_] =>> Any
1501[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-core/src/main/scala/tsec/jwt/algorithms/JWA.scala:74:36
1502[warn] 74 |abstract class JWTRSASig[A: RSAKFTag] extends JWTSigAlgo[A] {
1503[warn] | ^
1504[warn] | unused implicit parameter
1505[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-core/src/main/scala/tsec/jwt/util/ParseEncodedKeySpec.scala:82:43
1506[warn] 82 | )(implicit me: MonadError[F, Throwable], ecTag: ECKFTag[A]): F[Array[Byte]] = {
1507[warn] | ^^^^^
1508[warn] | unused implicit parameter
1509[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-core/src/main/scala/tsec/jwt/util/ParseEncodedKeySpec.scala:96:8
1510[warn] 96 | var signatureDER = scala.collection.mutable.ListBuffer.empty[Byte]
1511[warn] | ^^^^^^^^^^^^
1512[warn] | unset local variable, consider using an immutable val instead
1513[warn] 6 warnings found
1514[info] done compiling
1515[info] compiling 1 Scala source to /build/repo/jwt-core/target/scala-3.8.0/test-classes ...
1516[info] done compiling
1517[info] JWTClaimsTest:
1518[info] JWTClaims
1519[info] - should not mutate the internal json tree
1520[info] - should embed and retrieve a custom field correctly, without mutating
1521[info] - should embed and retrieve a top level custom object
1522[info] - should Serialize and deserialize properly
1523[info] - should correctly deserialize the 'aud' field when it is a string literal
1524[info] - should correctly deserialize the 'aud' field when it is a list of strings
1525Starting build for ProjectRef(file:/build/repo/,tsec-jwt-mac) (tsec-jwt-mac)... [2/14]
1526Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, --java-output-version:17, -Wconf:msg=can be rewritten automatically under:s, -source:3.8
1527[info] compiling 3 Scala sources to /build/repo/jwt-mac/target/scala-3.8.0/classes ...
1528[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWSMacHeader.scala:36:36
1529[warn] 36 | implicit def encoder[A: JWTMacAlgo]: Encoder[JWSMacHeader[A]] {
1530[warn] | ^
1531[warn] | unused implicit parameter
1532[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWSMacHeader.scala:80:42
1533[warn] 80 | implicit def genSerializer[A: JWTMacAlgo](
1534[warn] | ^
1535[warn] | unused implicit parameter
1536[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:46:43
1537[warn] 46 | def generateSignature[F[_], A: JWTMacAlgo](
1538[warn] | ^
1539[warn] | unused implicit parameter
1540[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:52:6
1541[warn] 52 | me: Sync[F]
1542[warn] | ^^
1543[warn] | unused implicit parameter
1544[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:57:6
1545[warn] 57 | me: Sync[F]
1546[warn] | ^^
1547[warn] | unused implicit parameter
1548[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:60:39
1549[warn] 60 | def buildToString[F[_], A: JWTMacAlgo](
1550[warn] | ^
1551[warn] | unused implicit parameter
1552[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:64:32
1553[warn] 64 | )(implicit s: JWSMacCV[F, A], me: Sync[F]): F[String] = s.signToString(header, body, key)
1554[warn] | ^^
1555[warn] | unused implicit parameter
1556[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:69:32
1557[warn] 69 | )(implicit s: JWSMacCV[F, A], me: Sync[F]): F[String] = s.signToString(JWSMacHeader[A], body, key)
1558[warn] | ^^
1559[warn] | unused implicit parameter
1560[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:71:36
1561[warn] 71 | def verifyBool[F[_], A: JWTMacAlgo](jwt: String, key: MacSigningKey[A])(
1562[warn] | ^
1563[warn] | unused implicit parameter
1564[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:76:32
1565[warn] 76 | def verify[F[_], A: JWTMacAlgo](jwt: String, key: MacSigningKey[A])(
1566[warn] | ^
1567[warn] | unused implicit parameter
1568[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:87:46
1569[warn] 87 | def verifyFromStringBool[F[_], A: JWTMacAlgo](jwt: String, key: MacSigningKey[A])(
1570[warn] | ^
1571[warn] | unused implicit parameter
1572[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:92:48
1573[warn] 92 | def verifyFromInstanceBool[F[_], A: JWTMacAlgo](jwt: JWTMac[A], key: MacSigningKey[A])(
1574[warn] | ^
1575[warn] | unused implicit parameter
1576[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:98:42
1577[warn] 98 | def verifyFromString[F[_], A: JWTMacAlgo](jwt: String, key: MacSigningKey[A])(
1578[warn] | ^
1579[warn] | unused implicit parameter
1580[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:103:44
1581[warn] 103 | def verifyFromInstance[F[_], A: JWTMacAlgo](jwt: JWTMac[A], key: MacSigningKey[A])(
1582[warn] | ^
1583[warn] | unused implicit parameter
1584[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:109:41
1585[warn] 109 | def toEncodedString[F[_], A: JWTMacAlgo](
1586[warn] | ^
1587[warn] | unused implicit parameter
1588[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:111:32
1589[warn] 111 | )(implicit s: JWSMacCV[F, A], me: Sync[F]): String = s.toEncodedString(jwt)
1590[warn] | ^^
1591[warn] | unused implicit parameter
1592[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:113:41
1593[warn] 113 | def parseUnverified[F[_], A: JWTMacAlgo](
1594[warn] | ^
1595[warn] | unused implicit parameter
1596[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:115:32
1597[warn] 115 | )(implicit s: JWSMacCV[F, A], me: Sync[F]): F[JWTMac[A]] = s.parseUnverified(jwt)
1598[warn] | ^^
1599[warn] | unused implicit parameter
1600[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:143:37
1601[warn] 143 | def generateSignature[A: JWTMacAlgo](header: JWSMacHeader[A], body: JWTClaims, key: MacSigningKey[A])(
1602[warn] | ^
1603[warn] | unused implicit parameter
1604[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:157:33
1605[warn] 157 | def buildToString[A: JWTMacAlgo](
1606[warn] | ^
1607[warn] | unused implicit parameter
1608[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:171:36
1609[warn] 171 | def verifyFromString[A: JWTMacAlgo](jwt: String, key: MacSigningKey[A])(
1610[warn] | ^
1611[warn] | unused implicit parameter
1612[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:175:38
1613[warn] 175 | def verifyFromInstance[A: JWTMacAlgo](jwt: JWTMac[A], key: MacSigningKey[A])(
1614[warn] | ^
1615[warn] | unused implicit parameter
1616[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:183:35
1617[warn] 183 | def toEncodedString[A: JWTMacAlgo](
1618[warn] | ^
1619[warn] | unused implicit parameter
1620[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:187:35
1621[warn] 187 | def parseUnverified[A: JWTMacAlgo](
1622[warn] | ^
1623[warn] | unused implicit parameter
1624[warn] -- [E092] Pattern Match Unchecked Warning: /build/repo/jwt-mac/src/main/scala/tsec/jws/mac/JWTMac.scala:28:9
1625[warn] 28 | case j: JWTMac[A] => ==(j)
1626[warn] | ^
1627[warn] |the type test for tsec.jws.mac.JWTMac[A] cannot be checked at runtime because its type arguments can't be determined from Any
1628[warn] |
1629[warn] | longer explanation available when compiling with `-explain`
1630[warn] 25 warnings found
1631[info] done compiling
1632[info] compiling 1 Scala source to /build/repo/jwt-mac/target/scala-3.8.0/test-classes ...
1633[info] done compiling
1634[info] JWTMacTests:
1635[info] JWT pureHS256
1636[info] - should sign and verify properly with no expiry
1637[info] - should sign and verify properly for proper expiry
1638[info] - should sign and verify properly for proper nbf, iat, and expiry
1639[info] - should parse unverified correctly
1640[info] - should fail verification for expired token
1641[info] - should fail verification if evaluated before nbf
1642[info] - should fail verification if iat is some nonsensical time in the future
1643[info] JWT impureHS256
1644[info] - should sign and verify properly with no expiry
1645[info] - should sign and verify properly for proper expiry
1646[info] - should sign and verify properly for proper nbf, iat, and expiry
1647[info] - should fail verification for expired token
1648[info] - should fail verification if evaluated before nbf
1649[info] - should fail verification if iat is some nonsensical time in the future
1650[info] JWT pureHS512
1651[info] - should sign and verify properly with no expiry
1652[info] - should sign and verify properly for proper expiry
1653[info] - should sign and verify properly for proper nbf, iat, and expiry
1654[info] - should parse unverified correctly
1655[info] - should fail verification for expired token
1656[info] - should fail verification if evaluated before nbf
1657[info] - should fail verification if iat is some nonsensical time in the future
1658[info] JWT impureHS512
1659[info] - should sign and verify properly with no expiry
1660[info] - should sign and verify properly for proper expiry
1661[info] - should sign and verify properly for proper nbf, iat, and expiry
1662[info] - should fail verification for expired token
1663[info] - should fail verification if evaluated before nbf
1664[info] - should fail verification if iat is some nonsensical time in the future
1665[info] JWT pureHS384
1666[info] - should sign and verify properly with no expiry
1667[info] - should sign and verify properly for proper expiry
1668[info] - should sign and verify properly for proper nbf, iat, and expiry
1669[info] - should parse unverified correctly
1670[info] - should fail verification for expired token
1671[info] - should fail verification if evaluated before nbf
1672[info] - should fail verification if iat is some nonsensical time in the future
1673[info] JWT impureHS384
1674[info] - should sign and verify properly with no expiry
1675[info] - should sign and verify properly for proper expiry
1676[info] - should sign and verify properly for proper nbf, iat, and expiry
1677[info] - should fail verification for expired token
1678[info] - should fail verification if evaluated before nbf
1679[info] - should fail verification if iat is some nonsensical time in the future
1680[info] JWTS
1681[info] - should not properly deserialize a JWT that is signed with a different algorithm and key
1682Starting build for ProjectRef(file:/build/repo/,tsec-mac) (tsec-mac)... [3/14]
1683Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, --java-output-version:17, -Wconf:msg=can be rewritten automatically under:s, -source:3.8
1684[info] compiling 1 Scala source to /build/repo/mac/target/scala-3.8.0/test-classes ...
1685[info] done compiling
1686[info] MacTests:
1687[info] HmacSHA1
1688[info] - should Sign then verify the same encrypted data properly
1689[info] - should sign to the same message
1690[info] - should not verify for different messages
1691[info] - should not verify for different keys
1692[info] HmacSHA256
1693[info] - should Sign then verify the same encrypted data properly
1694[info] - should sign to the same message
1695[info] - should not verify for different messages
1696[info] - should not verify for different keys
1697[info] HmacSHA384
1698[info] - should Sign then verify the same encrypted data properly
1699[info] - should sign to the same message
1700[info] - should not verify for different messages
1701[info] - should not verify for different keys
1702[info] HmacSHA512
1703[info] - should Sign then verify the same encrypted data properly
1704[info] - should sign to the same message
1705[info] - should not verify for different messages
1706[info] - should not verify for different keys
1707Starting build for ProjectRef(file:/build/repo/,tsec-cipher-bouncy) (tsec-cipher-bouncy)... [4/14]
1708Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, --java-output-version:17, -Wconf:msg=can be rewritten automatically under:s, -source:3.8
1709[info] compiling 6 Scala sources and 2 Java sources to /build/repo/cipher-bouncy/target/scala-3.8.0/classes ...
1710[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-bouncy/src/main/scala/tsec/cipher/symmetric/bouncy/ChaCha20Cipher.scala:363:20
1711[warn] 363 | poly1305.doFinal(tagOut, tOutOffset)
1712[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1713[warn] |discarded non-Unit value of type Int. Add `: Unit` to discard silently.
1714[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-bouncy/src/main/scala/tsec/cipher/symmetric/bouncy/ChaCha20Poly1305.scala:36:20
1715[warn] 36 | poly1305.doFinal(tagOut, tOutOffset)
1716[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1717[warn] | discarded non-Unit value of type Int. Add `: Unit` to discard silently.
1718[warn] two warnings found
1719[info] done compiling
1720[info] compiling 1 Scala source to /build/repo/cipher-bouncy/target/scala-3.8.0/test-classes ...
1721[info] done compiling
1722[info] BouncyCipherTests:
1723[info] Cipher test: XSalsa20Poly1305Bouncy
1724[info] - should Encrypt and decrypt for the same key
1725[info] - should not decrypt properly for an incorrect key
1726[info] - should Encrypt and decrypt for the same key in detached mode
1727[info] - should not decrypt properly for an incorrect key in detached mode
1728[info] Cipher test: XSalsa20Poly1305Bouncy Key Generator
1729[info] - should Not allow a key with incorrect length
1730[info] AEAD Cipher: XChaCha20Poly1305Bouncy
1731[info] - should Encrypt and decrypt for the same key
1732[info] - should Encrypt and decrypt for the same key and AEAD
1733[info] - should not decrypt properly for an incorrect key
1734[info] - should not decrypt properly for correct key but incorrect AAD
1735[info] - should Encrypt and decrypt for the same key in detached mode
1736[info] - should Encrypt and decrypt for the same key and AEAD in detached mode
1737[info] - should not decrypt properly for an incorrect key in detached mode
1738[info] - should not decrypt properly for correct key but incorrect AAD in detached mode
1739[info] AEAD Cipher: XChaCha20Poly1305Bouncy Key Generator
1740[info] - should Not allow a key with incorrect length
1741[info] AEAD Cipher: ChaCha20Poly1305Bouncy
1742[info] - should Encrypt and decrypt for the same key
1743[info] - should Encrypt and decrypt for the same key and AEAD
1744[info] - should not decrypt properly for an incorrect key
1745[info] - should not decrypt properly for correct key but incorrect AAD
1746[info] - should Encrypt and decrypt for the same key in detached mode
1747[info] - should Encrypt and decrypt for the same key and AEAD in detached mode
1748[info] - should not decrypt properly for an incorrect key in detached mode
1749[info] - should not decrypt properly for correct key but incorrect AAD in detached mode
1750[info] AEAD Cipher: ChaCha20Poly1305Bouncy Key Generator
1751[info] - should Not allow a key with incorrect length
1752[info] AEAD Cipher: ChaCha20Poly1305IETFBouncy
1753[info] - should Encrypt and decrypt for the same key
1754[info] - should Encrypt and decrypt for the same key and AEAD
1755[info] - should not decrypt properly for an incorrect key
1756[info] - should not decrypt properly for correct key but incorrect AAD
1757[info] - should Encrypt and decrypt for the same key in detached mode
1758[info] - should Encrypt and decrypt for the same key and AEAD in detached mode
1759[info] - should not decrypt properly for an incorrect key in detached mode
1760[info] - should not decrypt properly for correct key but incorrect AAD in detached mode
1761[info] AEAD Cipher: ChaCha20Poly1305IETFBouncy Key Generator
1762[info] - should Not allow a key with incorrect length
1763Starting build for ProjectRef(file:/build/repo/,tsec-signatures) (tsec-signatures)... [5/14]
1764Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, --java-output-version:17, -Wconf:msg=can be rewritten automatically under:s, -source:3.8
1765[info] compiling 1 Scala source to /build/repo/signatures/target/scala-3.8.0/test-classes ...
1766[info] done compiling
1767[info] SignatureTests:
1768[info] SHA1withDSA
1769[info] - should sign and verify properly for correct keypair
1770[info] - should not verify for a wrong key pair
1771[info] SHA224withDSA
1772[info] - should sign and verify properly for correct keypair
1773[info] - should not verify for a wrong key pair
1774[info] SHA256withDSA
1775[info] - should sign and verify properly for correct keypair
1776[info] - should not verify for a wrong key pair
1777[info] MD2withRSA
1778[info] - should sign and verify properly for correct keypair
1779[info] - should not verify for a wrong key pair
1780[info] MD5withRSA
1781[info] - should sign and verify properly for correct keypair
1782[info] - should not verify for a wrong key pair
1783[info] SHA1withRSA
1784[info] - should sign and verify properly for correct keypair
1785[info] - should not verify for a wrong key pair
1786[info] SHA256withRSA
1787[info] - should sign and verify properly for correct keypair
1788[info] - should not verify for a wrong key pair
1789[info] SHA384withRSA
1790[info] - should sign and verify properly for correct keypair
1791[info] - should not verify for a wrong key pair
1792[info] SHA512withRSA
1793[info] - should sign and verify properly for correct keypair
1794[info] - should not verify for a wrong key pair
1795[info] SHA1withECDSA
1796[info] - should sign and verify properly for correct keypair
1797[info] - should not verify for a wrong key pair
1798[info] SHA224withECDSA
1799[info] - should sign and verify properly for correct keypair
1800[info] - should not verify for a wrong key pair
1801[info] SHA256withECDSA
1802[info] - should sign and verify properly for correct keypair
1803[info] - should not verify for a wrong key pair
1804[info] SHA384withECDSA
1805[info] - should sign and verify properly for correct keypair
1806[info] - should not verify for a wrong key pair
1807[info] SHA512withECDSA
1808[info] - should sign and verify properly for correct keypair
1809[info] - should not verify for a wrong key pair
1810[info] NONEwithECDSA
1811[info] - should sign and verify properly for correct keypair
1812[info] - should not verify for a wrong key pair
1813[info] SHA256withRSA
1814[info] - should verify with RSA key generated from modulus and public exponent
1815[info] SHA384withRSA
1816[info] - should verify with RSA key generated from modulus and public exponent
1817[info] SHA512withRSA
1818[info] - should verify with RSA key generated from modulus and public exponent
1819[info] SHA256withECDSA
1820[info] - should verify with EC key generated from public point
1821[info] SHA384withECDSA
1822[info] - should verify with EC key generated from public point
1823[info] SHA512withECDSA
1824[info] - should verify with EC key generated from public point
1825Starting build for ProjectRef(file:/build/repo/,tsec-password) (tsec-password)... [6/14]
1826Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, --java-output-version:17, -Wconf:msg=can be rewritten automatically under:s, -source:3.8
1827[info] compiling 7 Scala sources and 1 Java source to /build/repo/password-hashers/target/scala-3.8.0/classes ...
1828[warn] there were 2 deprecation warnings; re-run with -deprecation for details
1829[warn] one warning found
1830[warn] /build/repo/password-hashers/src/main/scala/tsec/passwordhashers/jca/internal/JBCrypt.java:498:13: redundant cast to int[]
1831[warn] (int[])P_orig.clone()
1832[warn] ^
1833[warn] /build/repo/password-hashers/src/main/scala/tsec/passwordhashers/jca/internal/JBCrypt.java:499:13: redundant cast to int[]
1834[warn] (int[])S_orig.clone()
1835[warn] ^
1836[info] done compiling
1837[info] compiling 1 Scala source to /build/repo/password-hashers/target/scala-3.8.0/test-classes ...
1838[info] done compiling
1839[info] PasswordTest:
1840[info] SCrypt
1841[info] - should generate and verify with default settings
1842[info] SCrypt
1843[info] - should generate and verify with default settings for chars
1844[info] SCrypt
1845[info] - should generate and verify with default settings for bytes
1846[info] - should not verify for an incorrect password
1847[info] BCrypt
1848[info] - should generate and verify with default settings
1849[info] BCrypt
1850[info] - should generate and verify with default settings for chars
1851[info] BCrypt
1852[info] - should generate and verify with default settings for bytes
1853[info] - should not verify for an incorrect password
1854[info] BCrypt only variable rounds
1855[info] - should hash properly for more than 10 rounds
1856Starting build for ProjectRef(file:/build/repo/,tsec-common) (tsec-common)... [7/14]
1857Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, --java-output-version:17, -Wconf:msg=can be rewritten automatically under:s, -source:3.8
1858[info] TSecOpsTest:
1859[info] TSec ops
1860[info] - should convert Float properly
1861[info] - should convert Double properly
1862[info] - should convert Long properly
1863[info] - should convert Short properly
1864[info] - should convert Int properly
1865[info] SymmetricSpec:
1866Starting build for ProjectRef(file:/build/repo/,tsec-cipher-jca) (tsec-cipher-jca)... [8/14]
1867Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, --java-output-version:17, -Wconf:msg=can be rewritten automatically under:s, -source:3.8
1868[info] compiling 17 Scala sources to /build/repo/cipher-symmetric/target/scala-3.8.0/classes ...
1869[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:47:61
1870[warn] 47 | private[tsec] def standardProcess[A, M, P: SymmetricPadding](
1871[warn] | ^
1872[warn] | unused implicit parameter
1873[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:105:42
1874[warn] 105 | implicit def ecbProcess[A: BlockCipher]: IvProcess[A, ECB, NoPadding] =
1875[warn] | ^
1876[warn] | unused implicit parameter
1877[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:130:40
1878[warn] 130 | implicit def gcmProcess[A](implicit aes: AES[A]): IvProcess[A, GCM, NoPadding] =
1879[warn] | ^^^
1880[warn] | unused implicit parameter
1881[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:151:39
1882[warn] 151 | def randomIVStrategy[F[_], Out: AES](implicit F: Sync[F]): IvGen[F, Out] =
1883[warn] | ^
1884[warn] | unused implicit parameter
1885[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:169:45
1886[warn] 169 | implicit def noModeProcess[A: BlockCipher]: IvProcess[A, NoMode, NoPadding] =
1887[warn] | ^
1888[warn] | unused implicit parameter
1889[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/main/scala/tsec/cipher/symmetric/jca/package.scala:208:41
1890[warn] 208 | )(implicit spec: IvProcess[A, M, P], blockCipher: BlockCipher[A]): Either[CipherTextError, CipherText[A]] =
1891[warn] | ^^^^^^^^^^^
1892[warn] | unused implicit parameter
1893[warn] 6 warnings found
1894[info] done compiling
1895[info] compiling 2 Scala sources to /build/repo/cipher-symmetric/target/scala-3.8.0/test-classes ...
1896[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:66:10
1897[warn] 66 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
1898[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1899[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1900[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:147:10
1901[warn] 147 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
1902[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1903[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1904[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:162:10
1905[warn] 162 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
1906[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1907[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1908[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:216:10
1909[warn] 216 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
1910[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1911[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1912[warn] -- [E175] Potential Issue Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:231:10
1913[warn] 231 | testEncryptionDecryption.attempt.unsafeRunSync() mustNot equal(Right(testMessage))
1914[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1915[warn] |discarded non-Unit value of type org.scalatest.Assertion. Add `: Unit` to discard silently.
1916[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:19:6
1917[warn] 19 | ivProcess: IvProcess[A, M, P],
1918[warn] | ^^^^^^^^^
1919[warn] | unused implicit parameter
1920[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:84:6
1921[warn] 84 | aead: AEADCipher[A],
1922[warn] | ^^^^
1923[warn] | unused implicit parameter
1924[warn] -- [E198] Unused Symbol Warning: /build/repo/cipher-symmetric/src/test/scala/tsec/JCASymmetricSpec.scala:87:6
1925[warn] 87 | ivProcess: IvProcess[A, M, P],
1926[warn] | ^^^^^^^^^
1927[warn] | unused implicit parameter
1928[warn] 8 warnings found
1929[info] done compiling
1930[info] JCASymmetricCipherTests:
1931[info] AES_128/GCM/NoPadding
1932[info] - should Encrypt and decrypt for the same key
1933[info] - should Be able to build a correct key from a repr
1934[info] - should Encrypt and decrypt for the same key and AEAD
1935[info] - should not decrypt properly for an incorrect key
1936[info] - should not decrypt properly for correct key but incorrect AAD
1937[info] - should Encrypt and decrypt for the same key in detached mode
1938[info] - should Be able to build a correct key from a repr in detached mode
1939[info] - should Encrypt and decrypt for the same key and AEAD in detached mode
1940[info] - should not decrypt properly for an incorrect key in detached mode
1941[info] - should not decrypt properly for correct key but incorrect AAD in detached mode
1942[info] AES_128/GCM/NoPadding Key Generator
1943[info] - should Not allow a key with incorrect length
1944[info] AES_128/CBC/PKCS5Padding
1945[info] - should Encrypt and decrypt for the same key
1946[info] - should Be able to build a correct key from a repr
1947[info] - should not decrypt properly for an incorrect key
1948[info] AES_128/CBC/PKCS5Padding Key Generator
1949[info] - should Not allow a key with incorrect length
1950[info] AES_128/CTR/NoPadding
1951[info] - should Encrypt and decrypt for the same key
1952[info] - should Be able to build a correct key from a repr
1953[info] - should not decrypt properly for an incorrect key
1954[info] AES_128/CTR/NoPadding Key Generator
1955[info] - should Not allow a key with incorrect length
1956[info] AES_192/GCM/NoPadding
1957[info] - should Encrypt and decrypt for the same key
1958[info] - should Be able to build a correct key from a repr
1959[info] - should Encrypt and decrypt for the same key and AEAD
1960[info] - should not decrypt properly for an incorrect key
1961[info] - should not decrypt properly for correct key but incorrect AAD
1962[info] - should Encrypt and decrypt for the same key in detached mode
1963[info] - should Be able to build a correct key from a repr in detached mode
1964[info] - should Encrypt and decrypt for the same key and AEAD in detached mode
1965[info] - should not decrypt properly for an incorrect key in detached mode
1966[info] - should not decrypt properly for correct key but incorrect AAD in detached mode
1967[info] AES_192/GCM/NoPadding Key Generator
1968[info] - should Not allow a key with incorrect length
1969[info] AES_192/CBC/PKCS5Padding
1970[info] - should Encrypt and decrypt for the same key
1971[info] - should Be able to build a correct key from a repr
1972[info] - should not decrypt properly for an incorrect key
1973[info] AES_192/CBC/PKCS5Padding Key Generator
1974[info] - should Not allow a key with incorrect length
1975[info] AES_192/CTR/NoPadding
1976[info] - should Encrypt and decrypt for the same key
1977[info] - should Be able to build a correct key from a repr
1978[info] - should not decrypt properly for an incorrect key
1979[info] AES_192/CTR/NoPadding Key Generator
1980[info] - should Not allow a key with incorrect length
1981[info] AES_256/GCM/NoPadding
1982[info] - should Encrypt and decrypt for the same key
1983[info] - should Be able to build a correct key from a repr
1984[info] - should Encrypt and decrypt for the same key and AEAD
1985[info] - should not decrypt properly for an incorrect key
1986[info] - should not decrypt properly for correct key but incorrect AAD
1987[info] - should Encrypt and decrypt for the same key in detached mode
1988[info] - should Be able to build a correct key from a repr in detached mode
1989[info] - should Encrypt and decrypt for the same key and AEAD in detached mode
1990[info] - should not decrypt properly for an incorrect key in detached mode
1991[info] - should not decrypt properly for correct key but incorrect AAD in detached mode
1992[info] AES_256/GCM/NoPadding Key Generator
1993[info] - should Not allow a key with incorrect length
1994[info] AES_256/CBC/PKCS5Padding
1995[info] - should Encrypt and decrypt for the same key
1996[info] - should Be able to build a correct key from a repr
1997[info] - should not decrypt properly for an incorrect key
1998[info] AES_256/CBC/PKCS5Padding Key Generator
1999[info] - should Not allow a key with incorrect length
2000[info] AES_256/CTR/NoPadding
2001[info] - should Encrypt and decrypt for the same key
2002[info] - should Be able to build a correct key from a repr
2003[info] - should not decrypt properly for an incorrect key
2004[info] AES_256/CTR/NoPadding Key Generator
2005[info] - should Not allow a key with incorrect length
2006[info] JCASymmetricSpec:
2007Starting build for ProjectRef(file:/build/repo/,tsec-hash-bouncy) (tsec-hash-bouncy)... [9/14]
2008Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, --java-output-version:17, -Wconf:msg=can be rewritten automatically under:s, -source:3.8
2009[info] compiling 3 Scala sources to /build/repo/hashing-bouncy/target/scala-3.8.0/classes ...
2010[info] done compiling
2011[info] compiling 1 Scala source to /build/repo/hashing-bouncy/target/scala-3.8.0/test-classes ...
2012[info] done compiling
2013[info] HasherTest:
2014[info] A cryptographic hash function for SHA3-224
2015[info] - should generate an equal hash for two equal byte arrays
2016[info] - should generate an equal hash for piped byte arrays
2017[info] A cryptographic hash function for SHA3-256
2018[info] - should generate an equal hash for two equal byte arrays
2019[info] - should generate an equal hash for piped byte arrays
2020[info] A cryptographic hash function for SHA3-384
2021[info] - should generate an equal hash for two equal byte arrays
2022[info] - should generate an equal hash for piped byte arrays
2023[info] A cryptographic hash function for SHA3-512
2024[info] - should generate an equal hash for two equal byte arrays
2025[info] - should generate an equal hash for piped byte arrays
2026[info] A cryptographic hash function for Whirlpool
2027[info] - should generate an equal hash for two equal byte arrays
2028[info] - should generate an equal hash for piped byte arrays
2029[info] A cryptographic hash function for RipeMD128
2030[info] - should generate an equal hash for two equal byte arrays
2031[info] - should generate an equal hash for piped byte arrays
2032[info] A cryptographic hash function for RipeMD160
2033[info] - should generate an equal hash for two equal byte arrays
2034[info] - should generate an equal hash for piped byte arrays
2035[info] A cryptographic hash function for RipeMD256
2036[info] - should generate an equal hash for two equal byte arrays
2037[info] - should generate an equal hash for piped byte arrays
2038[info] A cryptographic hash function for RipeMD320
2039[info] - should generate an equal hash for two equal byte arrays
2040[info] - should generate an equal hash for piped byte arrays
2041[info] A cryptographic hash function for GOST3411-2012-256
2042[info] - should generate an equal hash for two equal byte arrays
2043[info] - should generate an equal hash for piped byte arrays
2044[info] A cryptographic hash function for GOST3411-2012-512
2045[info] - should generate an equal hash for two equal byte arrays
2046[info] - should generate an equal hash for piped byte arrays
2047[info] A cryptographic hash function for BLAKE2B-160
2048[info] - should generate an equal hash for two equal byte arrays
2049[info] - should generate an equal hash for piped byte arrays
2050[info] A cryptographic hash function for BLAKE2B-256
2051[info] - should generate an equal hash for two equal byte arrays
2052[info] - should generate an equal hash for piped byte arrays
2053[info] A cryptographic hash function for BLAKE2B-384
2054[info] - should generate an equal hash for two equal byte arrays
2055[info] - should generate an equal hash for piped byte arrays
2056[info] A cryptographic hash function for BLAKE2B-512
2057[info] - should generate an equal hash for two equal byte arrays
2058[info] - should generate an equal hash for piped byte arrays
2059Starting build for ProjectRef(file:/build/repo/,tsec-http4s) (tsec-http4s)... [10/14]
2060Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, --java-output-version:17, -Wconf:msg=can be rewritten automatically under:s, -source:3.8
2061[info] compiling 4 Scala sources to /build/repo/message-digests/target/scala-3.8.0/classes ...
2062[info] done compiling
2063[info] compiling 27 Scala sources to /build/repo/tsec-http4s/target/scala-3.8.0/classes ...
2064[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/authentication/package.scala:76:8
2065[warn] 76 | onNotAuthenticated: Request[F] => F[Response[F]]
2066[warn] | ^^^^^^^^^^^^^^^^^^
2067[warn] | unused explicit parameter
2068[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/authentication/package.scala:160:8
2069[warn] 160 | unused: SecuredRequest[F, I, A]
2070[warn] | ^^^^^^
2071[warn] | unused explicit parameter
2072[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/authentication/package.scala:259:36
2073[warn] 259 | def extractBearerToken[F[_]: Monad](request: Request[F]): Option[String] =
2074[warn] | ^
2075[warn] | unused implicit parameter
2076[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/authorization/BasicRBAC.scala:37:33
2077[warn] 37 | def fromGroup[F[_], R: ClassTag, U, Auth](valueSet: AuthGroup[R])(
2078[warn] | ^
2079[warn] | unused implicit parameter
2080[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/authorization/package.scala:14:39
2081[warn] 14 | private def unsafeApply[G: ClassTag](array: Array[G]) = array.asInstanceOf[AuthGroup[G]]
2082[warn] | ^
2083[warn] | unused implicit parameter
2084[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/cookies/AEADCookieEncryptor.scala:30:6
2085[warn] 30 | ivStrat: IvGen[F, A]
2086[warn] | ^^^^^^^
2087[warn] | unused implicit parameter
2088[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/main/scala/tsec/cookies/package.scala:31:15
2089[warn] 31 | )(implicit encryptor: AADEncryptor[F, A, SecretKey]): Either[CipherTextError, CipherText[A]] = {
2090[warn] | ^^^^^^^^^
2091[warn] | unused implicit parameter
2092[warn] 7 warnings found
2093[info] done compiling
2094[info] compiling 14 Scala sources to /build/repo/tsec-http4s/target/scala-3.8.0/test-classes ...
2095[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/test/scala/tsec/authentication/AuthenticatorSpec.scala:80:40
2096[warn] 80 | def errorToNone[F[_]: Applicative, A](t: Throwable): OptionT[F, A] =
2097[warn] | ^
2098[warn] | unused explicit parameter
2099[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/test/scala/tsec/authentication/AuthenticatorSpec.scala:106:8
2100[warn] 106 | def dAll(): Unit = storageMap.clear()
2101[warn] | ^^^^
2102[warn] | unused private member
2103[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/test/scala/tsec/authentication/AuthenticatorSpec.scala:302:16
2104[warn] 302 | forAll { (dummy1: DummyUser) =>
2105[warn] | ^^^^^^
2106[warn] | unused explicit parameter
2107[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/test/scala/tsec/authentication/EncryptedCookieAuthenticatorSpec.scala:30:43
2108[warn] 30 | implicit def cookieBackingStore[A: AESGCM]: BackingStore[IO, UUID, AuthEncryptedCookie[A, Int]] =
2109[warn] | ^
2110[warn] | unused implicit parameter
2111[warn] -- [E198] Unused Symbol Warning: /build/repo/tsec-http4s/src/test/scala/tsec/authentication/EncryptedCookieAuthenticatorSpec.scala:102:10
2112[warn] 102 | def extractFromResponse(response: Response[IO]): OptionT[IO, AuthEncryptedCookie[A, Int]] = {
2113[warn] | ^^^^^^^^^^^^^^^^^^^
2114[warn] | unused private member
2115[warn] 5 warnings found
2116[info] done compiling
2117[info] CookieSignerTests:
2118[info] CookieSigner for algo HmacSHA1
2119[info] - should Sign and verify any cookie properly with coercion
2120[info] - should Sign and retrieve properly for any properly signed message
2121[info] - should Not return true for verifying an incorrect key
2122[info] - should verify UUIDs properly
2123[info] CookieSigner for algo HmacSHA256
2124[info] - should Sign and verify any cookie properly with coercion
2125[info] - should Sign and retrieve properly for any properly signed message
2126[info] - should Not return true for verifying an incorrect key
2127[info] - should verify UUIDs properly
2128[info] CookieSigner for algo HmacSHA384
2129[info] - should Sign and verify any cookie properly with coercion
2130[info] - should Sign and retrieve properly for any properly signed message
2131[info] - should Not return true for verifying an incorrect key
2132[info] - should verify UUIDs properly
2133[info] CookieSigner for algo HmacSHA512
2134[info] - should Sign and verify any cookie properly with coercion
2135[info] - should Sign and retrieve properly for any properly signed message
2136[info] - should Not return true for verifying an incorrect key
2137[info] - should verify UUIDs properly
2138[info] AuthorizationTests:
2139[info] BasicRBAC
2140[info] - should let a request pass through if in group
2141[info] - should not let a request pass through if not contained
2142[info] BasicDAC
2143[info] - should let a request pass if owner but not in group
2144[info] - should let a request pass if in group but not owner
2145[info] - should not let the request pass if in neither
2146[info] HierarchyAuth
2147[info] - should let a user with lower than the required clearance pass
2148[info] - should let a user with equal clearance pass
2149[info] - should not a user with equal clearance pass
2150[info] DynamicRBAC
2151[info] - should let a request pass through if in group
2152[info] - should not let a request pass through if not contained
2153[info] Bell La Padula
2154[info] - should read same level
2155[info] - should read lower level
2156[info] - should not read up
2157[info] - should only write same level
2158[info] CSRFSpec:
2159[info] EncryptedCookieAuthenticatorSpec:
2160[info] JWTAuthenticatorSpec:
2161[info] RequestAuthenticatorSpec:
2162SLF4J: Failed to load class "org.slf4j.impl.StaticLoggerBinder".
2163SLF4J: Defaulting to no-operation (NOP) logger implementation
2164SLF4J: See http://www.slf4j.org/codes.html#StaticLoggerBinder for further details.
2165[info] JWTAuthenticatorTests:
2166[info] HmacSHA256 JWT Token64 check
2167[info] - should pass token68 check
2168[info] HmacSHA384 JWT Token64 check
2169[info] - should pass token68 check
2170[info] HmacSHA512 JWT Token64 check
2171[info] - should pass token68 check
2172[info] Authenticator Stateful spec: HmacSHA256 in bearer token no rolling
2173[info] - should Create, embed and extract properly
2174[info] - should Not validate for an expired token
2175[info] - should renew properly
2176[info] - should Not validate for a token with a different key/incorrect
2177[info] - should discard a token properly
2178[info] - should Not validate for a token past the timeout
2179[info] - should refresh properly
2180[info] SecuredRequests: Request Auth Stateful spec: HmacSHA256 in bearer token no rolling
2181[info] - should TryExtractRaw properly
2182[info] - should Return a proper deserialized user
2183[info] - should fail on an expired token
2184[info] - should work on a renewed token
2185[info] - should Reject an invalid token
2186[info] - should Fail on a discarded token
2187[info] - should authorize for an allowed endpoint
2188[info] - should not authorize for a gated endpoint
2189[info] - should use the specified response when onNotAuthorized is specified
2190[info] - should catch unhandled errors into unauthorized
2191[info] - should extract properly for a user aware service
2192[info] - should work on a refreshed token
2193[info] - should fail on a timed out token
2194[info] Authenticator Stateful spec: HmacSHA256 in cookie no rolling
2195[info] - should Create, embed and extract properly
2196[info] - should Not validate for an expired token
2197[info] - should renew properly
2198[info] - should Not validate for a token with a different key/incorrect
2199[info] - should discard a token properly
2200[info] - should Not validate for a token past the timeout
2201[info] - should refresh properly
2202[info] SecuredRequests: Request Auth Stateful spec: HmacSHA256 in cookie no rolling
2203[info] - should TryExtractRaw properly
2204[info] - should Return a proper deserialized user
2205[info] - should fail on an expired token
2206[info] - should work on a renewed token
2207[info] - should Reject an invalid token
2208[info] - should Fail on a discarded token
2209[info] - should authorize for an allowed endpoint
2210[info] - should not authorize for a gated endpoint
2211[info] - should use the specified response when onNotAuthorized is specified
2212[info] - should catch unhandled errors into unauthorized
2213[info] - should extract properly for a user aware service
2214[info] - should work on a refreshed token
2215[info] - should fail on a timed out token
2216[info] Authenticator Stateful spec: HmacSHA256 in header no rolling
2217[info] - should Create, embed and extract properly
2218[info] - should Not validate for an expired token
2219[info] - should renew properly
2220[info] - should Not validate for a token with a different key/incorrect
2221[info] - should discard a token properly
2222[info] - should Not validate for a token past the timeout
2223[info] - should refresh properly
2224[info] SecuredRequests: Request Auth Stateful spec: HmacSHA256 in header no rolling
2225[info] - should TryExtractRaw properly
2226[info] - should Return a proper deserialized user
2227[info] - should fail on an expired token
2228[info] - should work on a renewed token
2229[info] - should Reject an invalid token
2230[info] - should Fail on a discarded token
2231[info] - should authorize for an allowed endpoint
2232[info] - should not authorize for a gated endpoint
2233[info] - should use the specified response when onNotAuthorized is specified
2234[info] - should catch unhandled errors into unauthorized
2235[info] - should extract properly for a user aware service
2236[info] - should work on a refreshed token
2237[info] - should fail on a timed out token
2238[info] Authenticator Stateful spec: HmacSHA256 in bearer token rolling
2239[info] - should Create, embed and extract properly
2240[info] - should Not validate for an expired token
2241[info] - should renew properly
2242[info] - should Not validate for a token with a different key/incorrect
2243[info] - should discard a token properly
2244[info] - should no-op validate for a timed out token
2245[info] SecuredRequests: Request Auth Stateful spec: HmacSHA256 in bearer token rolling
2246[info] - should TryExtractRaw properly
2247[info] - should Return a proper deserialized user
2248[info] - should fail on an expired token
2249[info] - should work on a renewed token
2250[info] - should Reject an invalid token
2251[info] - should Fail on a discarded token
2252[info] - should authorize for an allowed endpoint
2253[info] - should not authorize for a gated endpoint
2254[info] - should use the specified response when onNotAuthorized is specified
2255[info] - should catch unhandled errors into unauthorized
2256[info] - should extract properly for a user aware service
2257[info] - should no-op on a timed out token
2258[info] Authenticator Stateful spec: HmacSHA256 in cookie rolling
2259[info] - should Create, embed and extract properly
2260[info] - should Not validate for an expired token
2261[info] - should renew properly
2262[info] - should Not validate for a token with a different key/incorrect
2263[info] - should discard a token properly
2264[info] - should no-op validate for a timed out token
2265[info] SecuredRequests: Request Auth Stateful spec: HmacSHA256 in cookie rolling
2266[info] - should TryExtractRaw properly
2267[info] - should Return a proper deserialized user
2268[info] - should fail on an expired token
2269[info] - should work on a renewed token
2270[info] - should Reject an invalid token
2271[info] - should Fail on a discarded token
2272[info] - should authorize for an allowed endpoint
2273[info] - should not authorize for a gated endpoint
2274[info] - should use the specified response when onNotAuthorized is specified
2275[info] - should catch unhandled errors into unauthorized
2276[info] - should extract properly for a user aware service
2277[info] - should no-op on a timed out token
2278[info] Authenticator Stateful spec: HmacSHA256 in header rolling
2279[info] - should Create, embed and extract properly
2280[info] - should Not validate for an expired token
2281[info] - should renew properly
2282[info] - should Not validate for a token with a different key/incorrect
2283[info] - should discard a token properly
2284[info] - should no-op validate for a timed out token
2285[info] SecuredRequests: Request Auth Stateful spec: HmacSHA256 in header rolling
2286[info] - should TryExtractRaw properly
2287[info] - should Return a proper deserialized user
2288[info] - should fail on an expired token
2289[info] - should work on a renewed token
2290[info] - should Reject an invalid token
2291[info] - should Fail on a discarded token
2292[info] - should authorize for an allowed endpoint
2293[info] - should not authorize for a gated endpoint
2294[info] - should use the specified response when onNotAuthorized is specified
2295[info] - should catch unhandled errors into unauthorized
2296[info] - should extract properly for a user aware service
2297[info] - should no-op on a timed out token
2298[info] Authenticator Stateful spec: HmacSHA384 in bearer token no rolling
2299[info] - should Create, embed and extract properly
2300[info] - should Not validate for an expired token
2301[info] - should renew properly
2302[info] - should Not validate for a token with a different key/incorrect
2303[info] - should discard a token properly
2304[info] - should Not validate for a token past the timeout
2305[info] - should refresh properly
2306[info] SecuredRequests: Request Auth Stateful spec: HmacSHA384 in bearer token no rolling
2307[info] - should TryExtractRaw properly
2308[info] - should Return a proper deserialized user
2309[info] - should fail on an expired token
2310[info] - should work on a renewed token
2311[info] - should Reject an invalid token
2312[info] - should Fail on a discarded token
2313[info] - should authorize for an allowed endpoint
2314[info] - should not authorize for a gated endpoint
2315[info] - should use the specified response when onNotAuthorized is specified
2316[info] - should catch unhandled errors into unauthorized
2317[info] - should extract properly for a user aware service
2318[info] - should work on a refreshed token
2319[info] - should fail on a timed out token
2320[info] Authenticator Stateful spec: HmacSHA384 in cookie no rolling
2321[info] - should Create, embed and extract properly
2322[info] - should Not validate for an expired token
2323[info] - should renew properly
2324[info] - should Not validate for a token with a different key/incorrect
2325[info] - should discard a token properly
2326[info] - should Not validate for a token past the timeout
2327[info] - should refresh properly
2328[info] SecuredRequests: Request Auth Stateful spec: HmacSHA384 in cookie no rolling
2329[info] - should TryExtractRaw properly
2330[info] - should Return a proper deserialized user
2331[info] - should fail on an expired token
2332[info] - should work on a renewed token
2333[info] - should Reject an invalid token
2334[info] - should Fail on a discarded token
2335[info] - should authorize for an allowed endpoint
2336[info] - should not authorize for a gated endpoint
2337[info] - should use the specified response when onNotAuthorized is specified
2338[info] - should catch unhandled errors into unauthorized
2339[info] - should extract properly for a user aware service
2340[info] - should work on a refreshed token
2341[info] - should fail on a timed out token
2342[info] Authenticator Stateful spec: HmacSHA384 in header no rolling
2343[info] - should Create, embed and extract properly
2344[info] - should Not validate for an expired token
2345[info] - should renew properly
2346[info] - should Not validate for a token with a different key/incorrect
2347[info] - should discard a token properly
2348[info] - should Not validate for a token past the timeout
2349[info] - should refresh properly
2350[info] SecuredRequests: Request Auth Stateful spec: HmacSHA384 in header no rolling
2351[info] - should TryExtractRaw properly
2352[info] - should Return a proper deserialized user
2353[info] - should fail on an expired token
2354[info] - should work on a renewed token
2355[info] - should Reject an invalid token
2356[info] - should Fail on a discarded token
2357[info] - should authorize for an allowed endpoint
2358[info] - should not authorize for a gated endpoint
2359[info] - should use the specified response when onNotAuthorized is specified
2360[info] - should catch unhandled errors into unauthorized
2361[info] - should extract properly for a user aware service
2362[info] - should work on a refreshed token
2363[info] - should fail on a timed out token
2364[info] Authenticator Stateful spec: HmacSHA384 in bearer token rolling
2365[info] - should Create, embed and extract properly
2366[info] - should Not validate for an expired token
2367[info] - should renew properly
2368[info] - should Not validate for a token with a different key/incorrect
2369[info] - should discard a token properly
2370[info] - should no-op validate for a timed out token
2371[info] SecuredRequests: Request Auth Stateful spec: HmacSHA384 in bearer token rolling
2372[info] - should TryExtractRaw properly
2373[info] - should Return a proper deserialized user
2374[info] - should fail on an expired token
2375[info] - should work on a renewed token
2376[info] - should Reject an invalid token
2377[info] - should Fail on a discarded token
2378[info] - should authorize for an allowed endpoint
2379[info] - should not authorize for a gated endpoint
2380[info] - should use the specified response when onNotAuthorized is specified
2381[info] - should catch unhandled errors into unauthorized
2382[info] - should extract properly for a user aware service
2383[info] - should no-op on a timed out token
2384[info] Authenticator Stateful spec: HmacSHA384 in cookie rolling
2385[info] - should Create, embed and extract properly
2386[info] - should Not validate for an expired token
2387[info] - should renew properly
2388[info] - should Not validate for a token with a different key/incorrect
2389[info] - should discard a token properly
2390[info] - should no-op validate for a timed out token
2391[info] SecuredRequests: Request Auth Stateful spec: HmacSHA384 in cookie rolling
2392[info] - should TryExtractRaw properly
2393[info] - should Return a proper deserialized user
2394[info] - should fail on an expired token
2395[info] - should work on a renewed token
2396[info] - should Reject an invalid token
2397[info] - should Fail on a discarded token
2398[info] - should authorize for an allowed endpoint
2399[info] - should not authorize for a gated endpoint
2400[info] - should use the specified response when onNotAuthorized is specified
2401[info] - should catch unhandled errors into unauthorized
2402[info] - should extract properly for a user aware service
2403[info] - should no-op on a timed out token
2404[info] Authenticator Stateful spec: HmacSHA384 in header rolling
2405[info] - should Create, embed and extract properly
2406[info] - should Not validate for an expired token
2407[info] - should renew properly
2408[info] - should Not validate for a token with a different key/incorrect
2409[info] - should discard a token properly
2410[info] - should no-op validate for a timed out token
2411[info] SecuredRequests: Request Auth Stateful spec: HmacSHA384 in header rolling
2412[info] - should TryExtractRaw properly
2413[info] - should Return a proper deserialized user
2414[info] - should fail on an expired token
2415[info] - should work on a renewed token
2416[info] - should Reject an invalid token
2417[info] - should Fail on a discarded token
2418[info] - should authorize for an allowed endpoint
2419[info] - should not authorize for a gated endpoint
2420[info] - should use the specified response when onNotAuthorized is specified
2421[info] - should catch unhandled errors into unauthorized
2422[info] - should extract properly for a user aware service
2423[info] - should no-op on a timed out token
2424[info] Authenticator Stateful spec: HmacSHA512 in bearer token no rolling
2425[info] - should Create, embed and extract properly
2426[info] - should Not validate for an expired token
2427[info] - should renew properly
2428[info] - should Not validate for a token with a different key/incorrect
2429[info] - should discard a token properly
2430[info] - should Not validate for a token past the timeout
2431[info] - should refresh properly
2432[info] SecuredRequests: Request Auth Stateful spec: HmacSHA512 in bearer token no rolling
2433[info] - should TryExtractRaw properly
2434[info] - should Return a proper deserialized user
2435[info] - should fail on an expired token
2436[info] - should work on a renewed token
2437[info] - should Reject an invalid token
2438[info] - should Fail on a discarded token
2439[info] - should authorize for an allowed endpoint
2440[info] - should not authorize for a gated endpoint
2441[info] - should use the specified response when onNotAuthorized is specified
2442[info] - should catch unhandled errors into unauthorized
2443[info] - should extract properly for a user aware service
2444[info] - should work on a refreshed token
2445[info] - should fail on a timed out token
2446[info] Authenticator Stateful spec: HmacSHA512 in cookie no rolling
2447[info] - should Create, embed and extract properly
2448[info] - should Not validate for an expired token
2449[info] - should renew properly
2450[info] - should Not validate for a token with a different key/incorrect
2451[info] - should discard a token properly
2452[info] - should Not validate for a token past the timeout
2453[info] - should refresh properly
2454[info] SecuredRequests: Request Auth Stateful spec: HmacSHA512 in cookie no rolling
2455[info] - should TryExtractRaw properly
2456[info] - should Return a proper deserialized user
2457[info] - should fail on an expired token
2458[info] - should work on a renewed token
2459[info] - should Reject an invalid token
2460[info] - should Fail on a discarded token
2461[info] - should authorize for an allowed endpoint
2462[info] - should not authorize for a gated endpoint
2463[info] - should use the specified response when onNotAuthorized is specified
2464[info] - should catch unhandled errors into unauthorized
2465[info] - should extract properly for a user aware service
2466[info] - should work on a refreshed token
2467[info] - should fail on a timed out token
2468[info] Authenticator Stateful spec: HmacSHA512 in header no rolling
2469[info] - should Create, embed and extract properly
2470[info] - should Not validate for an expired token
2471[info] - should renew properly
2472[info] - should Not validate for a token with a different key/incorrect
2473[info] - should discard a token properly
2474[info] - should Not validate for a token past the timeout
2475[info] - should refresh properly
2476[info] SecuredRequests: Request Auth Stateful spec: HmacSHA512 in header no rolling
2477[info] - should TryExtractRaw properly
2478[info] - should Return a proper deserialized user
2479[info] - should fail on an expired token
2480[info] - should work on a renewed token
2481[info] - should Reject an invalid token
2482[info] - should Fail on a discarded token
2483[info] - should authorize for an allowed endpoint
2484[info] - should not authorize for a gated endpoint
2485[info] - should use the specified response when onNotAuthorized is specified
2486[info] - should catch unhandled errors into unauthorized
2487[info] - should extract properly for a user aware service
2488[info] - should work on a refreshed token
2489[info] - should fail on a timed out token
2490[info] Authenticator Stateful spec: HmacSHA512 in bearer token rolling
2491[info] - should Create, embed and extract properly
2492[info] - should Not validate for an expired token
2493[info] - should renew properly
2494[info] - should Not validate for a token with a different key/incorrect
2495[info] - should discard a token properly
2496[info] - should no-op validate for a timed out token
2497[info] SecuredRequests: Request Auth Stateful spec: HmacSHA512 in bearer token rolling
2498[info] - should TryExtractRaw properly
2499[info] - should Return a proper deserialized user
2500[info] - should fail on an expired token
2501[info] - should work on a renewed token
2502[info] - should Reject an invalid token
2503[info] - should Fail on a discarded token
2504[info] - should authorize for an allowed endpoint
2505[info] - should not authorize for a gated endpoint
2506[info] - should use the specified response when onNotAuthorized is specified
2507[info] - should catch unhandled errors into unauthorized
2508[info] - should extract properly for a user aware service
2509[info] - should no-op on a timed out token
2510[info] Authenticator Stateful spec: HmacSHA512 in cookie rolling
2511[info] - should Create, embed and extract properly
2512[info] - should Not validate for an expired token
2513[info] - should renew properly
2514[info] - should Not validate for a token with a different key/incorrect
2515[info] - should discard a token properly
2516[info] - should no-op validate for a timed out token
2517[info] SecuredRequests: Request Auth Stateful spec: HmacSHA512 in cookie rolling
2518[info] - should TryExtractRaw properly
2519[info] - should Return a proper deserialized user
2520[info] - should fail on an expired token
2521[info] - should work on a renewed token
2522[info] - should Reject an invalid token
2523[info] - should Fail on a discarded token
2524[info] - should authorize for an allowed endpoint
2525[info] - should not authorize for a gated endpoint
2526[info] - should use the specified response when onNotAuthorized is specified
2527[info] - should catch unhandled errors into unauthorized
2528[info] - should extract properly for a user aware service
2529[info] - should no-op on a timed out token
2530[info] Authenticator Stateful spec: HmacSHA512 in header rolling
2531[info] - should Create, embed and extract properly
2532[info] - should Not validate for an expired token
2533[info] - should renew properly
2534[info] - should Not validate for a token with a different key/incorrect
2535[info] - should discard a token properly
2536[info] - should no-op validate for a timed out token
2537[info] SecuredRequests: Request Auth Stateful spec: HmacSHA512 in header rolling
2538[info] - should TryExtractRaw properly
2539[info] - should Return a proper deserialized user
2540[info] - should fail on an expired token
2541[info] - should work on a renewed token
2542[info] - should Reject an invalid token
2543[info] - should Fail on a discarded token
2544[info] - should authorize for an allowed endpoint
2545[info] - should not authorize for a gated endpoint
2546[info] - should use the specified response when onNotAuthorized is specified
2547[info] - should catch unhandled errors into unauthorized
2548[info] - should extract properly for a user aware service
2549[info] - should no-op on a timed out token
2550[info] Authenticator Partial Stateless spec: HmacSHA256 in bearer token no rolling
2551[info] - should Create, embed and extract properly
2552[info] - should Not validate for an expired token
2553[info] - should renew properly
2554[info] - should Not validate for a token with a different key/incorrect
2555[info] - should discard a token properly
2556[info] - should Not validate for a token past the timeout
2557[info] - should refresh properly
2558[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA256 in bearer token no rolling
2559[info] - should TryExtractRaw properly
2560[info] - should Return a proper deserialized user
2561[info] - should fail on an expired token
2562[info] - should work on a renewed token
2563[info] - should Reject an invalid token
2564[info] - should Fail on a discarded token
2565[info] - should authorize for an allowed endpoint
2566[info] - should not authorize for a gated endpoint
2567[info] - should use the specified response when onNotAuthorized is specified
2568[info] - should catch unhandled errors into unauthorized
2569[info] - should extract properly for a user aware service
2570[info] - should work on a refreshed token
2571[info] - should fail on a timed out token
2572[info] Authenticator Partial Stateless spec: HmacSHA256 in cookie no rolling
2573[info] - should Create, embed and extract properly
2574[info] - should Not validate for an expired token
2575[info] - should renew properly
2576[info] - should Not validate for a token with a different key/incorrect
2577[info] - should discard a token properly
2578[info] - should Not validate for a token past the timeout
2579[info] - should refresh properly
2580[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA256 in cookie no rolling
2581[info] - should TryExtractRaw properly
2582[info] - should Return a proper deserialized user
2583[info] - should fail on an expired token
2584[info] - should work on a renewed token
2585[info] - should Reject an invalid token
2586[info] - should Fail on a discarded token
2587[info] - should authorize for an allowed endpoint
2588[info] - should not authorize for a gated endpoint
2589[info] - should use the specified response when onNotAuthorized is specified
2590[info] - should catch unhandled errors into unauthorized
2591[info] - should extract properly for a user aware service
2592[info] - should work on a refreshed token
2593[info] - should fail on a timed out token
2594[info] Authenticator Partial Stateless spec: HmacSHA256 in header no rolling
2595[info] - should Create, embed and extract properly
2596[info] - should Not validate for an expired token
2597[info] - should renew properly
2598[info] - should Not validate for a token with a different key/incorrect
2599[info] - should discard a token properly
2600[info] - should Not validate for a token past the timeout
2601[info] - should refresh properly
2602[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA256 in header no rolling
2603[info] - should TryExtractRaw properly
2604[info] - should Return a proper deserialized user
2605[info] - should fail on an expired token
2606[info] - should work on a renewed token
2607[info] - should Reject an invalid token
2608[info] - should Fail on a discarded token
2609[info] - should authorize for an allowed endpoint
2610[info] - should not authorize for a gated endpoint
2611[info] - should use the specified response when onNotAuthorized is specified
2612[info] - should catch unhandled errors into unauthorized
2613[info] - should extract properly for a user aware service
2614[info] - should work on a refreshed token
2615[info] - should fail on a timed out token
2616[info] Authenticator Partial Stateless spec: HmacSHA256 in bearer token rolling
2617[info] - should Create, embed and extract properly
2618[info] - should Not validate for an expired token
2619[info] - should renew properly
2620[info] - should Not validate for a token with a different key/incorrect
2621[info] - should discard a token properly
2622[info] - should no-op validate for a timed out token
2623[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA256 in bearer token rolling
2624[info] - should TryExtractRaw properly
2625[info] - should Return a proper deserialized user
2626[info] - should fail on an expired token
2627[info] - should work on a renewed token
2628[info] - should Reject an invalid token
2629[info] - should Fail on a discarded token
2630[info] - should authorize for an allowed endpoint
2631[info] - should not authorize for a gated endpoint
2632[info] - should use the specified response when onNotAuthorized is specified
2633[info] - should catch unhandled errors into unauthorized
2634[info] - should extract properly for a user aware service
2635[info] - should no-op on a timed out token
2636[info] Authenticator Partial Stateless spec: HmacSHA256 in cookie rolling
2637[info] - should Create, embed and extract properly
2638[info] - should Not validate for an expired token
2639[info] - should renew properly
2640[info] - should Not validate for a token with a different key/incorrect
2641[info] - should discard a token properly
2642[info] - should no-op validate for a timed out token
2643[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA256 in cookie rolling
2644[info] - should TryExtractRaw properly
2645[info] - should Return a proper deserialized user
2646[info] - should fail on an expired token
2647[info] - should work on a renewed token
2648[info] - should Reject an invalid token
2649[info] - should Fail on a discarded token
2650[info] - should authorize for an allowed endpoint
2651[info] - should not authorize for a gated endpoint
2652[info] - should use the specified response when onNotAuthorized is specified
2653[info] - should catch unhandled errors into unauthorized
2654[info] - should extract properly for a user aware service
2655[info] - should no-op on a timed out token
2656[info] Authenticator Partial Stateless spec: HmacSHA256 in header rolling
2657[info] - should Create, embed and extract properly
2658[info] - should Not validate for an expired token
2659[info] - should renew properly
2660[info] - should Not validate for a token with a different key/incorrect
2661[info] - should discard a token properly
2662[info] - should no-op validate for a timed out token
2663[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA256 in header rolling
2664[info] - should TryExtractRaw properly
2665[info] - should Return a proper deserialized user
2666[info] - should fail on an expired token
2667[info] - should work on a renewed token
2668[info] - should Reject an invalid token
2669[info] - should Fail on a discarded token
2670[info] - should authorize for an allowed endpoint
2671[info] - should not authorize for a gated endpoint
2672[info] - should use the specified response when onNotAuthorized is specified
2673[info] - should catch unhandled errors into unauthorized
2674[info] - should extract properly for a user aware service
2675[info] - should no-op on a timed out token
2676[info] Authenticator Partial Stateless spec: HmacSHA384 in bearer token no rolling
2677[info] - should Create, embed and extract properly
2678[info] - should Not validate for an expired token
2679[info] - should renew properly
2680[info] - should Not validate for a token with a different key/incorrect
2681[info] - should discard a token properly
2682[info] - should Not validate for a token past the timeout
2683[info] - should refresh properly
2684[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA384 in bearer token no rolling
2685[info] - should TryExtractRaw properly
2686[info] - should Return a proper deserialized user
2687[info] - should fail on an expired token
2688[info] - should work on a renewed token
2689[info] - should Reject an invalid token
2690[info] - should Fail on a discarded token
2691[info] - should authorize for an allowed endpoint
2692[info] - should not authorize for a gated endpoint
2693[info] - should use the specified response when onNotAuthorized is specified
2694[info] - should catch unhandled errors into unauthorized
2695[info] - should extract properly for a user aware service
2696[info] - should work on a refreshed token
2697[info] - should fail on a timed out token
2698[info] Authenticator Partial Stateless spec: HmacSHA384 in cookie no rolling
2699[info] - should Create, embed and extract properly
2700[info] - should Not validate for an expired token
2701[info] - should renew properly
2702[info] - should Not validate for a token with a different key/incorrect
2703[info] - should discard a token properly
2704[info] - should Not validate for a token past the timeout
2705[info] - should refresh properly
2706[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA384 in cookie no rolling
2707[info] - should TryExtractRaw properly
2708[info] - should Return a proper deserialized user
2709[info] - should fail on an expired token
2710[info] - should work on a renewed token
2711[info] - should Reject an invalid token
2712[info] - should Fail on a discarded token
2713[info] - should authorize for an allowed endpoint
2714[info] - should not authorize for a gated endpoint
2715[info] - should use the specified response when onNotAuthorized is specified
2716[info] - should catch unhandled errors into unauthorized
2717[info] - should extract properly for a user aware service
2718[info] - should work on a refreshed token
2719[info] - should fail on a timed out token
2720[info] Authenticator Partial Stateless spec: HmacSHA384 in header no rolling
2721[info] - should Create, embed and extract properly
2722[info] - should Not validate for an expired token
2723[info] - should renew properly
2724[info] - should Not validate for a token with a different key/incorrect
2725[info] - should discard a token properly
2726[info] - should Not validate for a token past the timeout
2727[info] - should refresh properly
2728[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA384 in header no rolling
2729[info] - should TryExtractRaw properly
2730[info] - should Return a proper deserialized user
2731[info] - should fail on an expired token
2732[info] - should work on a renewed token
2733[info] - should Reject an invalid token
2734[info] - should Fail on a discarded token
2735[info] - should authorize for an allowed endpoint
2736[info] - should not authorize for a gated endpoint
2737[info] - should use the specified response when onNotAuthorized is specified
2738[info] - should catch unhandled errors into unauthorized
2739[info] - should extract properly for a user aware service
2740[info] - should work on a refreshed token
2741[info] - should fail on a timed out token
2742[info] Authenticator Partial Stateless spec: HmacSHA384 in bearer token rolling
2743[info] - should Create, embed and extract properly
2744[info] - should Not validate for an expired token
2745[info] - should renew properly
2746[info] - should Not validate for a token with a different key/incorrect
2747[info] - should discard a token properly
2748[info] - should no-op validate for a timed out token
2749[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA384 in bearer token rolling
2750[info] - should TryExtractRaw properly
2751[info] - should Return a proper deserialized user
2752[info] - should fail on an expired token
2753[info] - should work on a renewed token
2754[info] - should Reject an invalid token
2755[info] - should Fail on a discarded token
2756[info] - should authorize for an allowed endpoint
2757[info] - should not authorize for a gated endpoint
2758[info] - should use the specified response when onNotAuthorized is specified
2759[info] - should catch unhandled errors into unauthorized
2760[info] - should extract properly for a user aware service
2761[info] - should no-op on a timed out token
2762[info] Authenticator Partial Stateless spec: HmacSHA384 in cookie rolling
2763[info] - should Create, embed and extract properly
2764[info] - should Not validate for an expired token
2765[info] - should renew properly
2766[info] - should Not validate for a token with a different key/incorrect
2767[info] - should discard a token properly
2768[info] - should no-op validate for a timed out token
2769[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA384 in cookie rolling
2770[info] - should TryExtractRaw properly
2771[info] - should Return a proper deserialized user
2772[info] - should fail on an expired token
2773[info] - should work on a renewed token
2774[info] - should Reject an invalid token
2775[info] - should Fail on a discarded token
2776[info] - should authorize for an allowed endpoint
2777[info] - should not authorize for a gated endpoint
2778[info] - should use the specified response when onNotAuthorized is specified
2779[info] - should catch unhandled errors into unauthorized
2780[info] - should extract properly for a user aware service
2781[info] - should no-op on a timed out token
2782[info] Authenticator Partial Stateless spec: HmacSHA384 in header rolling
2783[info] - should Create, embed and extract properly
2784[info] - should Not validate for an expired token
2785[info] - should renew properly
2786[info] - should Not validate for a token with a different key/incorrect
2787[info] - should discard a token properly
2788[info] - should no-op validate for a timed out token
2789[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA384 in header rolling
2790[info] - should TryExtractRaw properly
2791[info] - should Return a proper deserialized user
2792[info] - should fail on an expired token
2793[info] - should work on a renewed token
2794[info] - should Reject an invalid token
2795[info] - should Fail on a discarded token
2796[info] - should authorize for an allowed endpoint
2797[info] - should not authorize for a gated endpoint
2798[info] - should use the specified response when onNotAuthorized is specified
2799[info] - should catch unhandled errors into unauthorized
2800[info] - should extract properly for a user aware service
2801[info] - should no-op on a timed out token
2802[info] Authenticator Partial Stateless spec: HmacSHA512 in bearer token no rolling
2803[info] - should Create, embed and extract properly
2804[info] - should Not validate for an expired token
2805[info] - should renew properly
2806[info] - should Not validate for a token with a different key/incorrect
2807[info] - should discard a token properly
2808[info] - should Not validate for a token past the timeout
2809[info] - should refresh properly
2810[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA512 in bearer token no rolling
2811[info] - should TryExtractRaw properly
2812[info] - should Return a proper deserialized user
2813[info] - should fail on an expired token
2814[info] - should work on a renewed token
2815[info] - should Reject an invalid token
2816[info] - should Fail on a discarded token
2817[info] - should authorize for an allowed endpoint
2818[info] - should not authorize for a gated endpoint
2819[info] - should use the specified response when onNotAuthorized is specified
2820[info] - should catch unhandled errors into unauthorized
2821[info] - should extract properly for a user aware service
2822[info] - should work on a refreshed token
2823[info] - should fail on a timed out token
2824[info] Authenticator Partial Stateless spec: HmacSHA512 in cookie no rolling
2825[info] - should Create, embed and extract properly
2826[info] - should Not validate for an expired token
2827[info] - should renew properly
2828[info] - should Not validate for a token with a different key/incorrect
2829[info] - should discard a token properly
2830[info] - should Not validate for a token past the timeout
2831[info] - should refresh properly
2832[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA512 in cookie no rolling
2833[info] - should TryExtractRaw properly
2834[info] - should Return a proper deserialized user
2835[info] - should fail on an expired token
2836[info] - should work on a renewed token
2837[info] - should Reject an invalid token
2838[info] - should Fail on a discarded token
2839[info] - should authorize for an allowed endpoint
2840[info] - should not authorize for a gated endpoint
2841[info] - should use the specified response when onNotAuthorized is specified
2842[info] - should catch unhandled errors into unauthorized
2843[info] - should extract properly for a user aware service
2844[info] - should work on a refreshed token
2845[info] - should fail on a timed out token
2846[info] Authenticator Partial Stateless spec: HmacSHA512 in header no rolling
2847[info] - should Create, embed and extract properly
2848[info] - should Not validate for an expired token
2849[info] - should renew properly
2850[info] - should Not validate for a token with a different key/incorrect
2851[info] - should discard a token properly
2852[info] - should Not validate for a token past the timeout
2853[info] - should refresh properly
2854[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA512 in header no rolling
2855[info] - should TryExtractRaw properly
2856[info] - should Return a proper deserialized user
2857[info] - should fail on an expired token
2858[info] - should work on a renewed token
2859[info] - should Reject an invalid token
2860[info] - should Fail on a discarded token
2861[info] - should authorize for an allowed endpoint
2862[info] - should not authorize for a gated endpoint
2863[info] - should use the specified response when onNotAuthorized is specified
2864[info] - should catch unhandled errors into unauthorized
2865[info] - should extract properly for a user aware service
2866[info] - should work on a refreshed token
2867[info] - should fail on a timed out token
2868[info] Authenticator Partial Stateless spec: HmacSHA512 in bearer token rolling
2869[info] - should Create, embed and extract properly
2870[info] - should Not validate for an expired token
2871[info] - should renew properly
2872[info] - should Not validate for a token with a different key/incorrect
2873[info] - should discard a token properly
2874[info] - should no-op validate for a timed out token
2875[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA512 in bearer token rolling
2876[info] - should TryExtractRaw properly
2877[info] - should Return a proper deserialized user
2878[info] - should fail on an expired token
2879[info] - should work on a renewed token
2880[info] - should Reject an invalid token
2881[info] - should Fail on a discarded token
2882[info] - should authorize for an allowed endpoint
2883[info] - should not authorize for a gated endpoint
2884[info] - should use the specified response when onNotAuthorized is specified
2885[info] - should catch unhandled errors into unauthorized
2886[info] - should extract properly for a user aware service
2887[info] - should no-op on a timed out token
2888[info] Authenticator Partial Stateless spec: HmacSHA512 in cookie rolling
2889[info] - should Create, embed and extract properly
2890[info] - should Not validate for an expired token
2891[info] - should renew properly
2892[info] - should Not validate for a token with a different key/incorrect
2893[info] - should discard a token properly
2894[info] - should no-op validate for a timed out token
2895[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA512 in cookie rolling
2896[info] - should TryExtractRaw properly
2897[info] - should Return a proper deserialized user
2898[info] - should fail on an expired token
2899[info] - should work on a renewed token
2900[info] - should Reject an invalid token
2901[info] - should Fail on a discarded token
2902[info] - should authorize for an allowed endpoint
2903[info] - should not authorize for a gated endpoint
2904[info] - should use the specified response when onNotAuthorized is specified
2905[info] - should catch unhandled errors into unauthorized
2906[info] - should extract properly for a user aware service
2907[info] - should no-op on a timed out token
2908[info] Authenticator Partial Stateless spec: HmacSHA512 in header rolling
2909[info] - should Create, embed and extract properly
2910[info] - should Not validate for an expired token
2911[info] - should renew properly
2912[info] - should Not validate for a token with a different key/incorrect
2913[info] - should discard a token properly
2914[info] - should no-op validate for a timed out token
2915[info] SecuredRequests: Request Auth Partial Stateless spec: HmacSHA512 in header rolling
2916[info] - should TryExtractRaw properly
2917[info] - should Return a proper deserialized user
2918[info] - should fail on an expired token
2919[info] - should work on a renewed token
2920[info] - should Reject an invalid token
2921[info] - should Fail on a discarded token
2922[info] - should authorize for an allowed endpoint
2923[info] - should not authorize for a gated endpoint
2924[info] - should use the specified response when onNotAuthorized is specified
2925[info] - should catch unhandled errors into unauthorized
2926[info] - should extract properly for a user aware service
2927[info] - should no-op on a timed out token
2928[info] Authenticator Stateless spec: HmacSHA256 in bearer token no rolling
2929[info] - should Create, embed and extract properly
2930[info] - should Not validate for an expired token
2931[info] - should renew properly
2932[info] - should Not validate for a token with a different key/incorrect
2933[info] - should discard a token properly
2934[info] - should Not validate for a token past the timeout
2935[info] - should refresh properly
2936[info] SecuredRequests: Request Auth Stateless spec: HmacSHA256 in bearer token no rolling
2937[info] - should TryExtractRaw properly
2938[info] - should Return a proper deserialized user
2939[info] - should fail on an expired token
2940[info] - should work on a renewed token
2941[info] - should Reject an invalid token
2942[info] - should Fail on a discarded token
2943[info] - should authorize for an allowed endpoint
2944[info] - should not authorize for a gated endpoint
2945[info] - should use the specified response when onNotAuthorized is specified
2946[info] - should catch unhandled errors into unauthorized
2947[info] - should extract properly for a user aware service
2948[info] - should work on a refreshed token
2949[info] - should fail on a timed out token
2950[info] Authenticator Stateless spec: HmacSHA256 in cookie no rolling
2951[info] - should Create, embed and extract properly
2952[info] - should Not validate for an expired token
2953[info] - should renew properly
2954[info] - should Not validate for a token with a different key/incorrect
2955[info] - should discard a token properly
2956[info] - should Not validate for a token past the timeout
2957[info] - should refresh properly
2958[info] SecuredRequests: Request Auth Stateless spec: HmacSHA256 in cookie no rolling
2959[info] - should TryExtractRaw properly
2960[info] - should Return a proper deserialized user
2961[info] - should fail on an expired token
2962[info] - should work on a renewed token
2963[info] - should Reject an invalid token
2964[info] - should Fail on a discarded token
2965[info] - should authorize for an allowed endpoint
2966[info] - should not authorize for a gated endpoint
2967[info] - should use the specified response when onNotAuthorized is specified
2968[info] - should catch unhandled errors into unauthorized
2969[info] - should extract properly for a user aware service
2970[info] - should work on a refreshed token
2971[info] - should fail on a timed out token
2972[info] Authenticator Stateless spec: HmacSHA256 in header no rolling
2973[info] - should Create, embed and extract properly
2974[info] - should Not validate for an expired token
2975[info] - should renew properly
2976[info] - should Not validate for a token with a different key/incorrect
2977[info] - should discard a token properly
2978[info] - should Not validate for a token past the timeout
2979[info] - should refresh properly
2980[info] SecuredRequests: Request Auth Stateless spec: HmacSHA256 in header no rolling
2981[info] - should TryExtractRaw properly
2982[info] - should Return a proper deserialized user
2983[info] - should fail on an expired token
2984[info] - should work on a renewed token
2985[info] - should Reject an invalid token
2986[info] - should Fail on a discarded token
2987[info] - should authorize for an allowed endpoint
2988[info] - should not authorize for a gated endpoint
2989[info] - should use the specified response when onNotAuthorized is specified
2990[info] - should catch unhandled errors into unauthorized
2991[info] - should extract properly for a user aware service
2992[info] - should work on a refreshed token
2993[info] - should fail on a timed out token
2994[info] Authenticator Stateless spec: HmacSHA256 in bearer token rolling
2995[info] - should Create, embed and extract properly
2996[info] - should Not validate for an expired token
2997[info] - should renew properly
2998[info] - should Not validate for a token with a different key/incorrect
2999[info] - should discard a token properly
3000[info] - should no-op validate for a timed out token
3001[info] SecuredRequests: Request Auth Stateless spec: HmacSHA256 in bearer token rolling
3002[info] - should TryExtractRaw properly
3003[info] - should Return a proper deserialized user
3004[info] - should fail on an expired token
3005[info] - should work on a renewed token
3006[info] - should Reject an invalid token
3007[info] - should Fail on a discarded token
3008[info] - should authorize for an allowed endpoint
3009[info] - should not authorize for a gated endpoint
3010[info] - should use the specified response when onNotAuthorized is specified
3011[info] - should catch unhandled errors into unauthorized
3012[info] - should extract properly for a user aware service
3013[info] - should no-op on a timed out token
3014[info] Authenticator Stateless spec: HmacSHA256 in cookie rolling
3015[info] - should Create, embed and extract properly
3016[info] - should Not validate for an expired token
3017[info] - should renew properly
3018[info] - should Not validate for a token with a different key/incorrect
3019[info] - should discard a token properly
3020[info] - should no-op validate for a timed out token
3021[info] SecuredRequests: Request Auth Stateless spec: HmacSHA256 in cookie rolling
3022[info] - should TryExtractRaw properly
3023[info] - should Return a proper deserialized user
3024[info] - should fail on an expired token
3025[info] - should work on a renewed token
3026[info] - should Reject an invalid token
3027[info] - should Fail on a discarded token
3028[info] - should authorize for an allowed endpoint
3029[info] - should not authorize for a gated endpoint
3030[info] - should use the specified response when onNotAuthorized is specified
3031[info] - should catch unhandled errors into unauthorized
3032[info] - should extract properly for a user aware service
3033[info] - should no-op on a timed out token
3034[info] Authenticator Stateless spec: HmacSHA256 in header rolling
3035[info] - should Create, embed and extract properly
3036[info] - should Not validate for an expired token
3037[info] - should renew properly
3038[info] - should Not validate for a token with a different key/incorrect
3039[info] - should discard a token properly
3040[info] - should no-op validate for a timed out token
3041[info] SecuredRequests: Request Auth Stateless spec: HmacSHA256 in header rolling
3042[info] - should TryExtractRaw properly
3043[info] - should Return a proper deserialized user
3044[info] - should fail on an expired token
3045[info] - should work on a renewed token
3046[info] - should Reject an invalid token
3047[info] - should Fail on a discarded token
3048[info] - should authorize for an allowed endpoint
3049[info] - should not authorize for a gated endpoint
3050[info] - should use the specified response when onNotAuthorized is specified
3051[info] - should catch unhandled errors into unauthorized
3052[info] - should extract properly for a user aware service
3053[info] - should no-op on a timed out token
3054[info] Authenticator Stateless spec: HmacSHA384 in bearer token no rolling
3055[info] - should Create, embed and extract properly
3056[info] - should Not validate for an expired token
3057[info] - should renew properly
3058[info] - should Not validate for a token with a different key/incorrect
3059[info] - should discard a token properly
3060[info] - should Not validate for a token past the timeout
3061[info] - should refresh properly
3062[info] SecuredRequests: Request Auth Stateless spec: HmacSHA384 in bearer token no rolling
3063[info] - should TryExtractRaw properly
3064[info] - should Return a proper deserialized user
3065[info] - should fail on an expired token
3066[info] - should work on a renewed token
3067[info] - should Reject an invalid token
3068[info] - should Fail on a discarded token
3069[info] - should authorize for an allowed endpoint
3070[info] - should not authorize for a gated endpoint
3071[info] - should use the specified response when onNotAuthorized is specified
3072[info] - should catch unhandled errors into unauthorized
3073[info] - should extract properly for a user aware service
3074[info] - should work on a refreshed token
3075[info] - should fail on a timed out token
3076[info] Authenticator Stateless spec: HmacSHA384 in cookie no rolling
3077[info] - should Create, embed and extract properly
3078[info] - should Not validate for an expired token
3079[info] - should renew properly
3080[info] - should Not validate for a token with a different key/incorrect
3081[info] - should discard a token properly
3082[info] - should Not validate for a token past the timeout
3083[info] - should refresh properly
3084[info] SecuredRequests: Request Auth Stateless spec: HmacSHA384 in cookie no rolling
3085[info] - should TryExtractRaw properly
3086[info] - should Return a proper deserialized user
3087[info] - should fail on an expired token
3088[info] - should work on a renewed token
3089[info] - should Reject an invalid token
3090[info] - should Fail on a discarded token
3091[info] - should authorize for an allowed endpoint
3092[info] - should not authorize for a gated endpoint
3093[info] - should use the specified response when onNotAuthorized is specified
3094[info] - should catch unhandled errors into unauthorized
3095[info] - should extract properly for a user aware service
3096[info] - should work on a refreshed token
3097[info] - should fail on a timed out token
3098[info] Authenticator Stateless spec: HmacSHA384 in header no rolling
3099[info] - should Create, embed and extract properly
3100[info] - should Not validate for an expired token
3101[info] - should renew properly
3102[info] - should Not validate for a token with a different key/incorrect
3103[info] - should discard a token properly
3104[info] - should Not validate for a token past the timeout
3105[info] - should refresh properly
3106[info] SecuredRequests: Request Auth Stateless spec: HmacSHA384 in header no rolling
3107[info] - should TryExtractRaw properly
3108[info] - should Return a proper deserialized user
3109[info] - should fail on an expired token
3110[info] - should work on a renewed token
3111[info] - should Reject an invalid token
3112[info] - should Fail on a discarded token
3113[info] - should authorize for an allowed endpoint
3114[info] - should not authorize for a gated endpoint
3115[info] - should use the specified response when onNotAuthorized is specified
3116[info] - should catch unhandled errors into unauthorized
3117[info] - should extract properly for a user aware service
3118[info] - should work on a refreshed token
3119[info] - should fail on a timed out token
3120[info] Authenticator Stateless spec: HmacSHA384 in bearer token rolling
3121[info] - should Create, embed and extract properly
3122[info] - should Not validate for an expired token
3123[info] - should renew properly
3124[info] - should Not validate for a token with a different key/incorrect
3125[info] - should discard a token properly
3126[info] - should no-op validate for a timed out token
3127[info] SecuredRequests: Request Auth Stateless spec: HmacSHA384 in bearer token rolling
3128[info] - should TryExtractRaw properly
3129[info] - should Return a proper deserialized user
3130[info] - should fail on an expired token
3131[info] - should work on a renewed token
3132[info] - should Reject an invalid token
3133[info] - should Fail on a discarded token
3134[info] - should authorize for an allowed endpoint
3135[info] - should not authorize for a gated endpoint
3136[info] - should use the specified response when onNotAuthorized is specified
3137[info] - should catch unhandled errors into unauthorized
3138[info] - should extract properly for a user aware service
3139[info] - should no-op on a timed out token
3140[info] Authenticator Stateless spec: HmacSHA384 in cookie rolling
3141[info] - should Create, embed and extract properly
3142[info] - should Not validate for an expired token
3143[info] - should renew properly
3144[info] - should Not validate for a token with a different key/incorrect
3145[info] - should discard a token properly
3146[info] - should no-op validate for a timed out token
3147[info] SecuredRequests: Request Auth Stateless spec: HmacSHA384 in cookie rolling
3148[info] - should TryExtractRaw properly
3149[info] - should Return a proper deserialized user
3150[info] - should fail on an expired token
3151[info] - should work on a renewed token
3152[info] - should Reject an invalid token
3153[info] - should Fail on a discarded token
3154[info] - should authorize for an allowed endpoint
3155[info] - should not authorize for a gated endpoint
3156[info] - should use the specified response when onNotAuthorized is specified
3157[info] - should catch unhandled errors into unauthorized
3158[info] - should extract properly for a user aware service
3159[info] - should no-op on a timed out token
3160[info] Authenticator Stateless spec: HmacSHA384 in header rolling
3161[info] - should Create, embed and extract properly
3162[info] - should Not validate for an expired token
3163[info] - should renew properly
3164[info] - should Not validate for a token with a different key/incorrect
3165[info] - should discard a token properly
3166[info] - should no-op validate for a timed out token
3167[info] SecuredRequests: Request Auth Stateless spec: HmacSHA384 in header rolling
3168[info] - should TryExtractRaw properly
3169[info] - should Return a proper deserialized user
3170[info] - should fail on an expired token
3171[info] - should work on a renewed token
3172[info] - should Reject an invalid token
3173[info] - should Fail on a discarded token
3174[info] - should authorize for an allowed endpoint
3175[info] - should not authorize for a gated endpoint
3176[info] - should use the specified response when onNotAuthorized is specified
3177[info] - should catch unhandled errors into unauthorized
3178[info] - should extract properly for a user aware service
3179[info] - should no-op on a timed out token
3180[info] Authenticator Stateless spec: HmacSHA512 in bearer token no rolling
3181[info] - should Create, embed and extract properly
3182[info] - should Not validate for an expired token
3183[info] - should renew properly
3184[info] - should Not validate for a token with a different key/incorrect
3185[info] - should discard a token properly
3186[info] - should Not validate for a token past the timeout
3187[info] - should refresh properly
3188[info] SecuredRequests: Request Auth Stateless spec: HmacSHA512 in bearer token no rolling
3189[info] - should TryExtractRaw properly
3190[info] - should Return a proper deserialized user
3191[info] - should fail on an expired token
3192[info] - should work on a renewed token
3193[info] - should Reject an invalid token
3194[info] - should Fail on a discarded token
3195[info] - should authorize for an allowed endpoint
3196[info] - should not authorize for a gated endpoint
3197[info] - should use the specified response when onNotAuthorized is specified
3198[info] - should catch unhandled errors into unauthorized
3199[info] - should extract properly for a user aware service
3200[info] - should work on a refreshed token
3201[info] - should fail on a timed out token
3202[info] Authenticator Stateless spec: HmacSHA512 in cookie no rolling
3203[info] - should Create, embed and extract properly
3204[info] - should Not validate for an expired token
3205[info] - should renew properly
3206[info] - should Not validate for a token with a different key/incorrect
3207[info] - should discard a token properly
3208[info] - should Not validate for a token past the timeout
3209[info] - should refresh properly
3210[info] SecuredRequests: Request Auth Stateless spec: HmacSHA512 in cookie no rolling
3211[info] - should TryExtractRaw properly
3212[info] - should Return a proper deserialized user
3213[info] - should fail on an expired token
3214[info] - should work on a renewed token
3215[info] - should Reject an invalid token
3216[info] - should Fail on a discarded token
3217[info] - should authorize for an allowed endpoint
3218[info] - should not authorize for a gated endpoint
3219[info] - should use the specified response when onNotAuthorized is specified
3220[info] - should catch unhandled errors into unauthorized
3221[info] - should extract properly for a user aware service
3222[info] - should work on a refreshed token
3223[info] - should fail on a timed out token
3224[info] Authenticator Stateless spec: HmacSHA512 in header no rolling
3225[info] - should Create, embed and extract properly
3226[info] - should Not validate for an expired token
3227[info] - should renew properly
3228[info] - should Not validate for a token with a different key/incorrect
3229[info] - should discard a token properly
3230[info] - should Not validate for a token past the timeout
3231[info] - should refresh properly
3232[info] SecuredRequests: Request Auth Stateless spec: HmacSHA512 in header no rolling
3233[info] - should TryExtractRaw properly
3234[info] - should Return a proper deserialized user
3235[info] - should fail on an expired token
3236[info] - should work on a renewed token
3237[info] - should Reject an invalid token
3238[info] - should Fail on a discarded token
3239[info] - should authorize for an allowed endpoint
3240[info] - should not authorize for a gated endpoint
3241[info] - should use the specified response when onNotAuthorized is specified
3242[info] - should catch unhandled errors into unauthorized
3243[info] - should extract properly for a user aware service
3244[info] - should work on a refreshed token
3245[info] - should fail on a timed out token
3246[info] Authenticator Stateless spec: HmacSHA512 in bearer token rolling
3247[info] - should Create, embed and extract properly
3248[info] - should Not validate for an expired token
3249[info] - should renew properly
3250[info] - should Not validate for a token with a different key/incorrect
3251[info] - should discard a token properly
3252[info] - should no-op validate for a timed out token
3253[info] SecuredRequests: Request Auth Stateless spec: HmacSHA512 in bearer token rolling
3254[info] - should TryExtractRaw properly
3255[info] - should Return a proper deserialized user
3256[info] - should fail on an expired token
3257[info] - should work on a renewed token
3258[info] - should Reject an invalid token
3259[info] - should Fail on a discarded token
3260[info] - should authorize for an allowed endpoint
3261[info] - should not authorize for a gated endpoint
3262[info] - should use the specified response when onNotAuthorized is specified
3263[info] - should catch unhandled errors into unauthorized
3264[info] - should extract properly for a user aware service
3265[info] - should no-op on a timed out token
3266[info] Authenticator Stateless spec: HmacSHA512 in cookie rolling
3267[info] - should Create, embed and extract properly
3268[info] - should Not validate for an expired token
3269[info] - should renew properly
3270[info] - should Not validate for a token with a different key/incorrect
3271[info] - should discard a token properly
3272[info] - should no-op validate for a timed out token
3273[info] SecuredRequests: Request Auth Stateless spec: HmacSHA512 in cookie rolling
3274[info] - should TryExtractRaw properly
3275[info] - should Return a proper deserialized user
3276[info] - should fail on an expired token
3277[info] - should work on a renewed token
3278[info] - should Reject an invalid token
3279[info] - should Fail on a discarded token
3280[info] - should authorize for an allowed endpoint
3281[info] - should not authorize for a gated endpoint
3282[info] - should use the specified response when onNotAuthorized is specified
3283[info] - should catch unhandled errors into unauthorized
3284[info] - should extract properly for a user aware service
3285[info] - should no-op on a timed out token
3286[info] Authenticator Stateless spec: HmacSHA512 in header rolling
3287[info] - should Create, embed and extract properly
3288[info] - should Not validate for an expired token
3289[info] - should renew properly
3290[info] - should Not validate for a token with a different key/incorrect
3291[info] - should discard a token properly
3292[info] - should no-op validate for a timed out token
3293[info] SecuredRequests: Request Auth Stateless spec: HmacSHA512 in header rolling
3294[info] - should TryExtractRaw properly
3295[info] - should Return a proper deserialized user
3296[info] - should fail on an expired token
3297[info] - should work on a renewed token
3298[info] - should Reject an invalid token
3299[info] - should Fail on a discarded token
3300[info] - should authorize for an allowed endpoint
3301[info] - should not authorize for a gated endpoint
3302[info] - should use the specified response when onNotAuthorized is specified
3303[info] - should catch unhandled errors into unauthorized
3304[info] - should extract properly for a user aware service
3305[info] - should no-op on a timed out token
3306[info] SignedCookieAuthenticatorTests:
3307[info] HMACSHA1 Authenticator
3308[info] - should Create, embed and extract properly
3309[info] - should Not validate for an expired token
3310[info] - should renew properly
3311[info] - should Not validate for a token with a different key/incorrect
3312[info] - should discard a token properly
3313[info] - should Not validate for a token past the timeout
3314[info] - should refresh properly
3315[info] HMACSHA256 Authenticator
3316[info] - should Create, embed and extract properly
3317[info] - should Not validate for an expired token
3318[info] - should renew properly
3319[info] - should Not validate for a token with a different key/incorrect
3320[info] - should discard a token properly
3321[info] - should Not validate for a token past the timeout
3322[info] - should refresh properly
3323[info] HMACSHA384 Authenticator
3324[info] - should Create, embed and extract properly
3325[info] - should Not validate for an expired token
3326[info] - should renew properly
3327[info] - should Not validate for a token with a different key/incorrect
3328[info] - should discard a token properly
3329[info] - should Not validate for a token past the timeout
3330[info] - should refresh properly
3331[info] HMACSHA512 Authenticator
3332[info] - should Create, embed and extract properly
3333[info] - should Not validate for an expired token
3334[info] - should renew properly
3335[info] - should Not validate for a token with a different key/incorrect
3336[info] - should discard a token properly
3337[info] - should Not validate for a token past the timeout
3338[info] - should refresh properly
3339[info] SecuredRequests: HMACSHA1 Authenticator
3340[info] - should TryExtractRaw properly
3341[info] - should Return a proper deserialized user
3342[info] - should fail on an expired token
3343[info] - should work on a renewed token
3344[info] - should Reject an invalid token
3345[info] - should Fail on a discarded token
3346[info] - should authorize for an allowed endpoint
3347[info] - should not authorize for a gated endpoint
3348[info] - should use the specified response when onNotAuthorized is specified
3349[info] - should catch unhandled errors into unauthorized
3350[info] - should extract properly for a user aware service
3351[info] - should work on a refreshed token
3352[info] - should fail on a timed out token
3353[info] SecuredRequests: HMACSHA256 Authenticator
3354[info] - should TryExtractRaw properly
3355[info] - should Return a proper deserialized user
3356[info] - should fail on an expired token
3357[info] - should work on a renewed token
3358[info] - should Reject an invalid token
3359[info] - should Fail on a discarded token
3360[info] - should authorize for an allowed endpoint
3361[info] - should not authorize for a gated endpoint
3362[info] - should use the specified response when onNotAuthorized is specified
3363[info] - should catch unhandled errors into unauthorized
3364[info] - should extract properly for a user aware service
3365[info] - should work on a refreshed token
3366[info] - should fail on a timed out token
3367[info] SecuredRequests: HMACSHA384 Authenticator
3368[info] - should TryExtractRaw properly
3369[info] - should Return a proper deserialized user
3370[info] - should fail on an expired token
3371[info] - should work on a renewed token
3372[info] - should Reject an invalid token
3373[info] - should Fail on a discarded token
3374[info] - should authorize for an allowed endpoint
3375[info] - should not authorize for a gated endpoint
3376[info] - should use the specified response when onNotAuthorized is specified
3377[info] - should catch unhandled errors into unauthorized
3378[info] - should extract properly for a user aware service
3379[info] - should work on a refreshed token
3380[info] - should fail on a timed out token
3381[info] SecuredRequests: HMACSHA512 Authenticator
3382[info] - should TryExtractRaw properly
3383[info] - should Return a proper deserialized user
3384[info] - should fail on an expired token
3385[info] - should work on a renewed token
3386[info] - should Reject an invalid token
3387[info] - should Fail on a discarded token
3388[info] - should authorize for an allowed endpoint
3389[info] - should not authorize for a gated endpoint
3390[info] - should use the specified response when onNotAuthorized is specified
3391[info] - should catch unhandled errors into unauthorized
3392[info] - should extract properly for a user aware service
3393[info] - should work on a refreshed token
3394[info] - should fail on a timed out token
3395[info] Signed Cookie Authenticator HmacSHA1
3396[info] - should expire tokens on discard
3397[info] Signed Cookie Authenticator HmacSHA256
3398[info] - should expire tokens on discard
3399[info] Signed Cookie Authenticator HmacSHA384
3400[info] - should expire tokens on discard
3401[info] Signed Cookie Authenticator HmacSHA512
3402[info] - should expire tokens on discard
3403[info] AEADCookieSignerTest:
3404[info] AEAD Cookie encrypting with AES128
3405[info] - should Encrypt and decrypt properly
3406[info] - should not encrypt and decrypt properly with an incorrect key
3407[info] AEAD Cookie encrypting with AES192
3408[info] - should Encrypt and decrypt properly
3409[info] - should not encrypt and decrypt properly with an incorrect key
3410[info] AEAD Cookie encrypting with AES256
3411[info] - should Encrypt and decrypt properly
3412[info] - should not encrypt and decrypt properly with an incorrect key
3413[info] CSRFTests:
3414[info] CSRF signing using HmacSHA1
3415[info] - should check for an equal token properly
3416[info] - should not validate different tokens
3417[info] CSRF middleware using HmacSHA1
3418[info] - should pass through and embed for a fresh request in a safe method
3419[info] - should fail and not embed a new token for a safe method but invalid cookie
3420[info] - should pass through and embed a slightly different token for a safe request
3421[info] - should validate for the correct csrf token
3422[info] - should not validate if token is missing in both
3423[info] - should not validate for token missing in header
3424[info] - should not validate for token missing in cookie
3425[info] - should not validate for different tokens
3426[info] - should not return the same token to mitigate BREACH
3427[info] - should not return a token for a failed CSRF check
3428[info] CSRF signing using HmacSHA256
3429[info] - should check for an equal token properly
3430[info] - should not validate different tokens
3431[info] CSRF middleware using HmacSHA256
3432[info] - should pass through and embed for a fresh request in a safe method
3433[info] - should fail and not embed a new token for a safe method but invalid cookie
3434[info] - should pass through and embed a slightly different token for a safe request
3435[info] - should validate for the correct csrf token
3436[info] - should not validate if token is missing in both
3437[info] - should not validate for token missing in header
3438[info] - should not validate for token missing in cookie
3439[info] - should not validate for different tokens
3440[info] - should not return the same token to mitigate BREACH
3441[info] - should not return a token for a failed CSRF check
3442[info] CSRF signing using HmacSHA384
3443[info] - should check for an equal token properly
3444[info] - should not validate different tokens
3445[info] CSRF middleware using HmacSHA384
3446[info] - should pass through and embed for a fresh request in a safe method
3447[info] - should fail and not embed a new token for a safe method but invalid cookie
3448[info] - should pass through and embed a slightly different token for a safe request
3449[info] - should validate for the correct csrf token
3450[info] - should not validate if token is missing in both
3451[info] - should not validate for token missing in header
3452[info] - should not validate for token missing in cookie
3453[info] - should not validate for different tokens
3454[info] - should not return the same token to mitigate BREACH
3455[info] - should not return a token for a failed CSRF check
3456[info] CSRF signing using HmacSHA512
3457[info] - should check for an equal token properly
3458[info] - should not validate different tokens
3459[info] CSRF middleware using HmacSHA512
3460[info] - should pass through and embed for a fresh request in a safe method
3461[info] - should fail and not embed a new token for a safe method but invalid cookie
3462[info] - should pass through and embed a slightly different token for a safe request
3463[info] - should validate for the correct csrf token
3464[info] - should not validate if token is missing in both
3465[info] - should not validate for token missing in header
3466[info] - should not validate for token missing in cookie
3467[info] - should not validate for different tokens
3468[info] - should not return the same token to mitigate BREACH
3469[info] - should not return a token for a failed CSRF check
3470[info] BearerTokenAuthenticatorTests:
3471[info] Bearer token authenticator
3472[info] - should Create, embed and extract properly
3473[info] - should Not validate for an expired token
3474[info] - should renew properly
3475[info] - should Not validate for a token with a different key/incorrect
3476[info] - should discard a token properly
3477[info] - should Not validate for a token past the timeout
3478[info] - should refresh properly
3479[info] SecuredRequests: Bearer token Request handler
3480[info] - should TryExtractRaw properly
3481[info] - should Return a proper deserialized user
3482[info] - should fail on an expired token
3483[info] - should work on a renewed token
3484[info] - should Reject an invalid token
3485[info] - should Fail on a discarded token
3486[info] - should authorize for an allowed endpoint
3487[info] - should not authorize for a gated endpoint
3488[info] - should use the specified response when onNotAuthorized is specified
3489[info] - should catch unhandled errors into unauthorized
3490[info] - should extract properly for a user aware service
3491[info] - should work on a refreshed token
3492[info] - should fail on a timed out token
3493[info] EncryptedCookieAuthenticatorTests:
3494[info] AES128GCM Authenticator w\ backing store
3495[info] - should Create, embed and extract properly
3496[info] - should Not validate for an expired token
3497[info] - should renew properly
3498[info] - should Not validate for a token with a different key/incorrect
3499[info] - should discard a token properly
3500[info] - should Not validate for a token past the timeout
3501[info] - should refresh properly
3502[info] AES192GCM Authenticator w\ backing store
3503[info] - should Create, embed and extract properly
3504[info] - should Not validate for an expired token
3505[info] - should renew properly
3506[info] - should Not validate for a token with a different key/incorrect
3507[info] - should discard a token properly
3508[info] - should Not validate for a token past the timeout
3509[info] - should refresh properly
3510[info] AES256GCM Authenticator w\ backing store
3511[info] - should Create, embed and extract properly
3512[info] - should Not validate for an expired token
3513[info] - should renew properly
3514[info] - should Not validate for a token with a different key/incorrect
3515[info] - should discard a token properly
3516[info] - should Not validate for a token past the timeout
3517[info] - should refresh properly
3518[info] AES128GCM Authenticator stateless
3519[info] - should Create, embed and extract properly
3520[info] - should Not validate for an expired token
3521[info] - should renew properly
3522[info] - should Not validate for a token with a different key/incorrect
3523[info] - should discard a token properly
3524[info] - should Not validate for a token past the timeout
3525[info] - should refresh properly
3526[info] AES192GCM Authenticator stateless
3527[info] - should Create, embed and extract properly
3528[info] - should Not validate for an expired token
3529[info] - should renew properly
3530[info] - should Not validate for a token with a different key/incorrect
3531[info] - should discard a token properly
3532[info] - should Not validate for a token past the timeout
3533[info] - should refresh properly
3534[info] AES256GCM Authenticator stateless
3535[info] - should Create, embed and extract properly
3536[info] - should Not validate for an expired token
3537[info] - should renew properly
3538[info] - should Not validate for a token with a different key/incorrect
3539[info] - should discard a token properly
3540[info] - should Not validate for a token past the timeout
3541[info] - should refresh properly
3542[info] SecuredRequests: AES128GCM Authenticator w\ backing store
3543[info] - should TryExtractRaw properly
3544[info] - should Return a proper deserialized user
3545[info] - should fail on an expired token
3546[info] - should work on a renewed token
3547[info] - should Reject an invalid token
3548[info] - should Fail on a discarded token
3549[info] - should authorize for an allowed endpoint
3550[info] - should not authorize for a gated endpoint
3551[info] - should use the specified response when onNotAuthorized is specified
3552[info] - should catch unhandled errors into unauthorized
3553[info] - should extract properly for a user aware service
3554[info] - should work on a refreshed token
3555[info] - should fail on a timed out token
3556[info] SecuredRequests: AES192GCM Authenticator w\ backing store
3557[info] - should TryExtractRaw properly
3558[info] - should Return a proper deserialized user
3559[info] - should fail on an expired token
3560[info] - should work on a renewed token
3561[info] - should Reject an invalid token
3562[info] - should Fail on a discarded token
3563[info] - should authorize for an allowed endpoint
3564[info] - should not authorize for a gated endpoint
3565[info] - should use the specified response when onNotAuthorized is specified
3566[info] - should catch unhandled errors into unauthorized
3567[info] - should extract properly for a user aware service
3568[info] - should work on a refreshed token
3569[info] - should fail on a timed out token
3570[info] SecuredRequests: AES256GCM Authenticator w\ backing store
3571[info] - should TryExtractRaw properly
3572[info] - should Return a proper deserialized user
3573[info] - should fail on an expired token
3574[info] - should work on a renewed token
3575[info] - should Reject an invalid token
3576[info] - should Fail on a discarded token
3577[info] - should authorize for an allowed endpoint
3578[info] - should not authorize for a gated endpoint
3579[info] - should use the specified response when onNotAuthorized is specified
3580[info] - should catch unhandled errors into unauthorized
3581[info] - should extract properly for a user aware service
3582[info] - should work on a refreshed token
3583[info] - should fail on a timed out token
3584[info] SecuredRequests: AES128GCM Authenticator stateless
3585[info] - should TryExtractRaw properly
3586[info] - should Return a proper deserialized user
3587[info] - should fail on an expired token
3588[info] - should work on a renewed token
3589[info] - should Reject an invalid token
3590[info] - should Fail on a discarded token
3591[info] - should authorize for an allowed endpoint
3592[info] - should not authorize for a gated endpoint
3593[info] - should use the specified response when onNotAuthorized is specified
3594[info] - should catch unhandled errors into unauthorized
3595[info] - should extract properly for a user aware service
3596[info] - should work on a refreshed token
3597[info] - should fail on a timed out token
3598[info] SecuredRequests: AES192GCM Authenticator stateless
3599[info] - should TryExtractRaw properly
3600[info] - should Return a proper deserialized user
3601[info] - should fail on an expired token
3602[info] - should work on a renewed token
3603[info] - should Reject an invalid token
3604[info] - should Fail on a discarded token
3605[info] - should authorize for an allowed endpoint
3606[info] - should not authorize for a gated endpoint
3607[info] - should use the specified response when onNotAuthorized is specified
3608[info] - should catch unhandled errors into unauthorized
3609[info] - should extract properly for a user aware service
3610[info] - should work on a refreshed token
3611[info] - should fail on a timed out token
3612[info] SecuredRequests: AES256GCM Authenticator stateless
3613[info] - should TryExtractRaw properly
3614[info] - should Return a proper deserialized user
3615[info] - should fail on an expired token
3616[info] - should work on a renewed token
3617[info] - should Reject an invalid token
3618[info] - should Fail on a discarded token
3619[info] - should authorize for an allowed endpoint
3620[info] - should not authorize for a gated endpoint
3621[info] - should use the specified response when onNotAuthorized is specified
3622[info] - should catch unhandled errors into unauthorized
3623[info] - should extract properly for a user aware service
3624[info] - should work on a refreshed token
3625[info] - should fail on a timed out token
3626[info] Stateless Encrypted cookie authenticator with AES256
3627[info] - should expire the cookie on discard
3628[info] - should pass along fixed settings
3629[info] Stateful Encrypted cookie authenticator with AES256
3630[info] - should expire the cookie on discard
3631[info] - should pass along fixed settings
3632[info] TSecAuthServiceTests:
3633[info] TSecAuthService
3634[info] - should compose and not fall through
3635Starting build for ProjectRef(file:/build/repo/,tsec-hash-jca) (tsec-hash-jca)... [11/14]
3636Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, --java-output-version:17, -Wconf:msg=can be rewritten automatically under:s, -source:3.8
3637[info] compiling 1 Scala source to /build/repo/message-digests/target/scala-3.8.0/test-classes ...
3638[info] done compiling
3639[info] HasherTest:
3640[info] A cryptographic hash function for MD5
3641[info] - should generate an equal hash for two equal byte arrays
3642[info] - should generate an equal hash for piped byte arrays
3643[info] A cryptographic hash function for SHA-1
3644[info] - should generate an equal hash for two equal byte arrays
3645[info] - should generate an equal hash for piped byte arrays
3646[info] A cryptographic hash function for SHA-256
3647[info] - should generate an equal hash for two equal byte arrays
3648[info] - should generate an equal hash for piped byte arrays
3649[info] A cryptographic hash function for SHA-512
3650[info] - should generate an equal hash for two equal byte arrays
3651[info] - should generate an equal hash for piped byte arrays
3652Starting build for ProjectRef(file:/build/repo/,tsec-bouncy) (tsec-bouncy)... [12/14]
3653Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, --java-output-version:17, -Wconf:msg=can be rewritten automatically under:s, -source:3.8
3654Starting build for ProjectRef(file:/build/repo/,tsec-jwt-sig) (tsec-jwt-sig)... [13/14]
3655Compile scalacOptions: -encoding, UTF-8, -unchecked, -Wunused:implicits, -Wunused:explicits, -Wunused:imports, -Wunused:locals, -Wunused:params, -Wunused:privates, -Wvalue-discard, -language:implicitConversions, -Xkind-projector, --java-output-version:17, -Wconf:msg=can be rewritten automatically under:s, -source:3.8
3656[info] compiling 4 Scala sources to /build/repo/jwt-sig/target/scala-3.8.0/classes ...
3657[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWSSigCV.scala:26:14
3658[warn] 26 | private def base64UrlSafe(s: String): Either[GeneralSignatureError, Array[Byte]] =
3659[warn] | ^^^^^^^^^^^^^
3660[warn] | unused private member
3661[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWSSignedHeader.scala:29:36
3662[warn] 29 | implicit def encoder[A: JWTSigAlgo]: Encoder[JWSSignedHeader[A]] = new Encoder[JWSSignedHeader[A]] {
3663[warn] | ^
3664[warn] | unused implicit parameter
3665[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWSSignedHeader.scala:96:44
3666[warn] 96 | implicit def genDeserializer[A: JWTSigAlgo](
3667[warn] | ^
3668[warn] | unused implicit parameter
3669[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:22:29
3670[warn] 22 | def signAndBuild[F[_]: Sync, A: JWTSigAlgo](
3671[warn] | ^
3672[warn] | unused implicit parameter
3673[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:27:29
3674[warn] 27 | def signAndBuild[F[_]: Sync, A: JWTSigAlgo](
3675[warn] | ^
3676[warn] | unused implicit parameter
3677[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:27:44
3678[warn] 27 | def signAndBuild[F[_]: Sync, A: JWTSigAlgo](
3679[warn] | ^
3680[warn] | unused implicit parameter
3681[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:33:29
3682[warn] 33 | def signToString[F[_]: Sync, A: JWTSigAlgo](
3683[warn] | ^
3684[warn] | unused implicit parameter
3685[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:38:29
3686[warn] 38 | def signToString[F[_]: Sync, A: JWTSigAlgo](
3687[warn] | ^
3688[warn] | unused implicit parameter
3689[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:38:44
3690[warn] 38 | def signToString[F[_]: Sync, A: JWTSigAlgo](
3691[warn] | ^
3692[warn] | unused implicit parameter
3693[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:44:33
3694[warn] 44 | def verifyK[F[_], A: JWTSigAlgo](
3695[warn] | ^
3696[warn] | unused implicit parameter
3697[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:50:33
3698[warn] 50 | def verifyC[F[_], A: JWTSigAlgo](
3699[warn] | ^
3700[warn] | unused implicit parameter
3701[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:76:32
3702[warn] 76 | def signAndBuild[A: JWTSigAlgo](header: JWSSignedHeader[A], body: JWTClaims, sigPrivateKey: SigPrivateKey[A])(
3703[warn] | ^
3704[warn] | unused implicit parameter
3705[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:80:32
3706[warn] 80 | def signToString[A: JWTSigAlgo](header: JWSSignedHeader[A], body: JWTClaims, sigPrivateKey: SigPrivateKey[A])(
3707[warn] | ^
3708[warn] | unused implicit parameter
3709[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:88:27
3710[warn] 88 | def verifyK[A: JWTSigAlgo](
3711[warn] | ^
3712[warn] | unused implicit parameter
3713[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/JWTSig.scala:93:27
3714[warn] 93 | def verifyC[A: JWTSigAlgo](
3715[warn] | ^
3716[warn] | unused implicit parameter
3717[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/UnverifiedJWTSig.scala:14:47
3718[warn] 14 |final case class UnverifiedJWTSig[A: JWTSigAlgo](
3719[warn] | ^
3720[warn] | unused implicit parameter
3721[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/UnverifiedJWTSig.scala:24:36
3722[warn] 24 | def unverified[F[_], A: JWTSigAlgo](jwt: String)(implicit F: Sync[F], sigCV: JWSSigCV[F, A]): F[UnverifiedJWTSig[A]] =
3723[warn] | ^
3724[warn] | unused implicit parameter
3725[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/UnverifiedJWTSig.scala:24:60
3726[warn] 24 | def unverified[F[_], A: JWTSigAlgo](jwt: String)(implicit F: Sync[F], sigCV: JWSSigCV[F, A]): F[UnverifiedJWTSig[A]] =
3727[warn] | ^
3728[warn] | unused implicit parameter
3729[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/UnverifiedJWTSig.scala:27:33
3730[warn] 27 | def verifyK[F[_], A: JWTSigAlgo](
3731[warn] | ^
3732[warn] | unused implicit parameter
3733[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/UnverifiedJWTSig.scala:33:33
3734[warn] 33 | def verifyC[F[_], A: JWTSigAlgo](
3735[warn] | ^
3736[warn] | unused implicit parameter
3737[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/UnverifiedJWTSig.scala:41:30
3738[warn] 41 | def unverified[A: JWTSigAlgo](jwt: String)(implicit sigCV: JWSSigCV[SigErrorM, A]): SigErrorM[UnverifiedJWTSig[A]] =
3739[warn] | ^
3740[warn] | unused implicit parameter
3741[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/UnverifiedJWTSig.scala:44:27
3742[warn] 44 | def verifyK[A: JWTSigAlgo](
3743[warn] | ^
3744[warn] | unused implicit parameter
3745[warn] -- [E198] Unused Symbol Warning: /build/repo/jwt-sig/src/main/scala/tsec/jws/signature/UnverifiedJWTSig.scala:50:27
3746[warn] 50 | def verifyC[A: JWTSigAlgo](
3747[warn] | ^
3748[warn] | unused implicit parameter
3749[warn] 23 warnings found
3750[info] done compiling
3751[info] compiling 1 Scala source to /build/repo/jwt-sig/target/scala-3.8.0/test-classes ...
3752[warn] -- [E175] Potential Issue Warning: /build/repo/jwt-sig/src/test/scala/tsec/JWTSigTests.scala:17:24
3753[warn] 17 | Security.addProvider(new BouncyCastleProvider())
3754[warn] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
3755[warn] | discarded non-Unit value of type Int. Add `: Unit` to discard silently.
3756[warn] one warning found
3757[info] done compiling
3758[info] JWTSigTests:
3759[info] JWT signature-style RS256 - pure
3760[info] - should Sign and verify properly for proper params
3761[info] - should Sign and verify properly for proper params with Unverified JWT
3762[info] - should not verify for an incorrect key
3763[info] - should not verify for an expired claim
3764[info] - should not verify for a future iat
3765[info] - should not verify for a wrong nbf
3766[info] JWT signature-style RS256 - SigErrorM
3767[info] - should Sign and verify properly for proper params
3768[info] - should Sign and verify properly for proper params with Unverified JWT
3769[info] - should not verify for an incorrect key
3770[info] - should not verify for an expired claim
3771[info] - should not verify for a future iat
3772[info] - should not verify for a wrong nbf
3773[info] JWT signature-style RS384 - pure
3774[info] - should Sign and verify properly for proper params
3775[info] - should Sign and verify properly for proper params with Unverified JWT
3776[info] - should not verify for an incorrect key
3777[info] - should not verify for an expired claim
3778[info] - should not verify for a future iat
3779[info] - should not verify for a wrong nbf
3780[info] JWT signature-style RS384 - SigErrorM
3781[info] - should Sign and verify properly for proper params
3782[info] - should Sign and verify properly for proper params with Unverified JWT
3783[info] - should not verify for an incorrect key
3784[info] - should not verify for an expired claim
3785[info] - should not verify for a future iat
3786[info] - should not verify for a wrong nbf
3787[info] JWT signature-style RS512 - pure
3788[info] - should Sign and verify properly for proper params
3789[info] - should Sign and verify properly for proper params with Unverified JWT
3790[info] - should not verify for an incorrect key
3791[info] - should not verify for an expired claim
3792[info] - should not verify for a future iat
3793[info] - should not verify for a wrong nbf
3794[info] JWT signature-style RS512 - SigErrorM
3795[info] - should Sign and verify properly for proper params
3796[info] - should Sign and verify properly for proper params with Unverified JWT
3797[info] - should not verify for an incorrect key
3798[info] - should not verify for an expired claim
3799[info] - should not verify for a future iat
3800[info] - should not verify for a wrong nbf
3801[info] JWT signature-style ES256 - pure
3802[info] - should Sign and verify properly for proper params
3803[info] - should Sign and verify properly for proper params with Unverified JWT
3804[info] - should not verify for an incorrect key
3805[info] - should not verify for an expired claim
3806[info] - should not verify for a future iat
3807[info] - should not verify for a wrong nbf
3808[info] JWT signature-style ES256 - SigErrorM
3809[info] - should Sign and verify properly for proper params
3810[info] - should Sign and verify properly for proper params with Unverified JWT
3811[info] - should not verify for an incorrect key
3812[info] - should not verify for an expired claim
3813[info] - should not verify for a future iat
3814[info] - should not verify for a wrong nbf
3815[info] JWT signature-style ES384 - pure
3816[info] - should Sign and verify properly for proper params
3817[info] - should Sign and verify properly for proper params with Unverified JWT
3818[info] - should not verify for an incorrect key
3819[info] - should not verify for an expired claim
3820[info] - should not verify for a future iat
3821[info] - should not verify for a wrong nbf
3822[info] JWT signature-style ES384 - SigErrorM
3823[info] - should Sign and verify properly for proper params
3824[info] - should Sign and verify properly for proper params with Unverified JWT
3825[info] - should not verify for an incorrect key
3826[info] - should not verify for an expired claim
3827[info] - should not verify for a future iat
3828[info] - should not verify for a wrong nbf
3829[info] JWT signature-style ES512 - pure
3830[info] - should Sign and verify properly for proper params
3831[info] - should Sign and verify properly for proper params with Unverified JWT
3832[info] - should not verify for an incorrect key
3833[info] - should not verify for an expired claim
3834[info] - should not verify for a future iat
3835[info] - should not verify for a wrong nbf
3836[info] JWT signature-style ES512 - SigErrorM
3837[info] - should Sign and verify properly for proper params
3838[info] - should Sign and verify properly for proper params with Unverified JWT
3839[info] - should not verify for an incorrect key
3840[info] - should not verify for an expired claim
3841[info] - should not verify for a future iat
3842[info] - should not verify for a wrong nbf
3843
3844************************
3845Build summary:
3846[{
3847 "module": "tsec-cipher-core",
3848 "compile": {"status": "ok", "tookMs": 9876, "warnings": 0, "errors": 0, "sourceVersion": "3.8"},
3849 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
3850 "test-compile": {"status": "ok", "tookMs": 4840, "warnings": 0, "errors": 0, "sourceVersion": "3.8"},
3851 "test": {"status": "ok", "tookMs": 226, "passed": 0, "failed": 0, "ignored": 0, "skipped": 0, "total": 0, "byFramework": []},
3852 "publish": {"status": "skipped", "tookMs": 0},
3853 "metadata": {
3854 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
3855}
3856},{
3857 "module": "tsec-jwt-core",
3858 "compile": {"status": "ok", "tookMs": 6290, "warnings": 6, "errors": 0, "sourceVersion": "3.8"},
3859 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
3860 "test-compile": {"status": "ok", "tookMs": 2007, "warnings": 0, "errors": 0, "sourceVersion": "3.8"},
3861 "test": {"status": "ok", "tookMs": 1706, "passed": 6, "failed": 0, "ignored": 0, "skipped": 0, "total": 6, "byFramework": [{"framework": "unknown", "stats": {"passed": 6, "failed": 0, "ignored": 0, "skipped": 0, "total": 6}}]},
3862 "publish": {"status": "skipped", "tookMs": 0},
3863 "metadata": {
3864 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
3865}
3866},{
3867 "module": "tsec-jwt-mac",
3868 "compile": {"status": "ok", "tookMs": 2485, "warnings": 25, "errors": 0, "sourceVersion": "3.8"},
3869 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
3870 "test-compile": {"status": "ok", "tookMs": 2253, "warnings": 0, "errors": 0, "sourceVersion": "3.8"},
3871 "test": {"status": "ok", "tookMs": 1921, "passed": 40, "failed": 0, "ignored": 0, "skipped": 0, "total": 40, "byFramework": [{"framework": "unknown", "stats": {"passed": 40, "failed": 0, "ignored": 0, "skipped": 0, "total": 40}}]},
3872 "publish": {"status": "skipped", "tookMs": 0},
3873 "metadata": {
3874 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
3875}
3876},{
3877 "module": "tsec-mac",
3878 "compile": {"status": "ok", "tookMs": 114, "warnings": 1, "errors": 0, "sourceVersion": "3.8"},
3879 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
3880 "test-compile": {"status": "ok", "tookMs": 1120, "warnings": 0, "errors": 0, "sourceVersion": "3.8"},
3881 "test": {"status": "ok", "tookMs": 1251, "passed": 16, "failed": 0, "ignored": 0, "skipped": 0, "total": 16, "byFramework": [{"framework": "unknown", "stats": {"passed": 16, "failed": 0, "ignored": 0, "skipped": 0, "total": 16}}]},
3882 "publish": {"status": "skipped", "tookMs": 0},
3883 "metadata": {
3884 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
3885}
3886},{
3887 "module": "tsec-cipher-bouncy",
3888 "compile": {"status": "ok", "tookMs": 1266, "warnings": 2, "errors": 0, "sourceVersion": "3.8"},
3889 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
3890 "test-compile": {"status": "ok", "tookMs": 856, "warnings": 0, "errors": 0, "sourceVersion": "3.8"},
3891 "test": {"status": "ok", "tookMs": 2061, "passed": 32, "failed": 0, "ignored": 0, "skipped": 0, "total": 32, "byFramework": [{"framework": "unknown", "stats": {"passed": 32, "failed": 0, "ignored": 0, "skipped": 0, "total": 32}}]},
3892 "publish": {"status": "skipped", "tookMs": 0},
3893 "metadata": {
3894 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
3895}
3896},{
3897 "module": "tsec-signatures",
3898 "compile": {"status": "ok", "tookMs": 158, "warnings": 0, "errors": 0, "sourceVersion": "3.8"},
3899 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
3900 "test-compile": {"status": "ok", "tookMs": 1311, "warnings": 0, "errors": 0, "sourceVersion": "3.8"},
3901 "test": {"status": "ok", "tookMs": 8596, "passed": 36, "failed": 0, "ignored": 0, "skipped": 0, "total": 36, "byFramework": [{"framework": "unknown", "stats": {"passed": 36, "failed": 0, "ignored": 0, "skipped": 0, "total": 36}}]},
3902 "publish": {"status": "skipped", "tookMs": 0},
3903 "metadata": {
3904 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
3905}
3906},{
3907 "module": "tsec-password",
3908 "compile": {"status": "ok", "tookMs": 876, "warnings": 0, "errors": 0, "sourceVersion": "3.8"},
3909 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
3910 "test-compile": {"status": "ok", "tookMs": 1283, "warnings": 0, "errors": 0, "sourceVersion": "3.8"},
3911 "test": {"status": "ok", "tookMs": 10230, "passed": 9, "failed": 0, "ignored": 0, "skipped": 0, "total": 9, "byFramework": [{"framework": "unknown", "stats": {"passed": 9, "failed": 0, "ignored": 0, "skipped": 0, "total": 9}}]},
3912 "publish": {"status": "skipped", "tookMs": 0},
3913 "metadata": {
3914 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
3915}
3916},{
3917 "module": "tsec-common",
3918 "compile": {"status": "ok", "tookMs": 71, "warnings": 1, "errors": 0, "sourceVersion": "3.8"},
3919 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
3920 "test-compile": {"status": "ok", "tookMs": 94, "warnings": 13, "errors": 0, "sourceVersion": "3.8"},
3921 "test": {"status": "ok", "tookMs": 1241, "passed": 5, "failed": 0, "ignored": 0, "skipped": 0, "total": 5, "byFramework": [{"framework": "unknown", "stats": {"passed": 5, "failed": 0, "ignored": 0, "skipped": 0, "total": 5}}]},
3922 "publish": {"status": "skipped", "tookMs": 0},
3923 "metadata": {
3924 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
3925}
3926},{
3927 "module": "tsec-cipher-jca",
3928 "compile": {"status": "ok", "tookMs": 1333, "warnings": 6, "errors": 0, "sourceVersion": "3.8"},
3929 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
3930 "test-compile": {"status": "ok", "tookMs": 1709, "warnings": 8, "errors": 0, "sourceVersion": "3.8"},
3931 "test": {"status": "ok", "tookMs": 1923, "passed": 57, "failed": 0, "ignored": 0, "skipped": 0, "total": 57, "byFramework": [{"framework": "unknown", "stats": {"passed": 57, "failed": 0, "ignored": 0, "skipped": 0, "total": 57}}]},
3932 "publish": {"status": "skipped", "tookMs": 0},
3933 "metadata": {
3934 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
3935}
3936},{
3937 "module": "tsec-hash-bouncy",
3938 "compile": {"status": "ok", "tookMs": 576, "warnings": 0, "errors": 0, "sourceVersion": "3.8"},
3939 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
3940 "test-compile": {"status": "ok", "tookMs": 1346, "warnings": 0, "errors": 0, "sourceVersion": "3.8"},
3941 "test": {"status": "ok", "tookMs": 2304, "passed": 30, "failed": 0, "ignored": 0, "skipped": 0, "total": 30, "byFramework": [{"framework": "unknown", "stats": {"passed": 30, "failed": 0, "ignored": 0, "skipped": 0, "total": 30}}]},
3942 "publish": {"status": "skipped", "tookMs": 0},
3943 "metadata": {
3944 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
3945}
3946},{
3947 "module": "tsec-http4s",
3948 "compile": {"status": "ok", "tookMs": 5606, "warnings": 7, "errors": 0, "sourceVersion": "3.8"},
3949 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
3950 "test-compile": {"status": "ok", "tookMs": 8362, "warnings": 5, "errors": 0, "sourceVersion": "3.8"},
3951 "test": {"status": "ok", "tookMs": 6983, "passed": 1342, "failed": 0, "ignored": 0, "skipped": 0, "total": 1342, "byFramework": [{"framework": "unknown", "stats": {"passed": 1342, "failed": 0, "ignored": 0, "skipped": 0, "total": 1342}}]},
3952 "publish": {"status": "skipped", "tookMs": 0},
3953 "metadata": {
3954 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
3955}
3956},{
3957 "module": "tsec-hash-jca",
3958 "compile": {"status": "ok", "tookMs": 83, "warnings": 0, "errors": 0, "sourceVersion": "3.8"},
3959 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
3960 "test-compile": {"status": "ok", "tookMs": 1012, "warnings": 0, "errors": 0, "sourceVersion": "3.8"},
3961 "test": {"status": "ok", "tookMs": 1806, "passed": 8, "failed": 0, "ignored": 0, "skipped": 0, "total": 8, "byFramework": [{"framework": "unknown", "stats": {"passed": 8, "failed": 0, "ignored": 0, "skipped": 0, "total": 8}}]},
3962 "publish": {"status": "skipped", "tookMs": 0},
3963 "metadata": {
3964 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
3965}
3966},{
3967 "module": "tsec-bouncy",
3968 "compile": {"status": "ok", "tookMs": 45, "warnings": 1, "errors": 0, "sourceVersion": "3.8"},
3969 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
3970 "test-compile": {"status": "ok", "tookMs": 96, "warnings": 0, "errors": 0, "sourceVersion": "3.8"},
3971 "test": {"status": "ok", "tookMs": 86, "passed": 0, "failed": 0, "ignored": 0, "skipped": 0, "total": 0, "byFramework": []},
3972 "publish": {"status": "skipped", "tookMs": 0},
3973 "metadata": {
3974 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
3975}
3976},{
3977 "module": "tsec-jwt-sig",
3978 "compile": {"status": "ok", "tookMs": 1448, "warnings": 23, "errors": 0, "sourceVersion": "3.8"},
3979 "doc": {"status": "skipped", "tookMs": 0, "files": 0, "totalSizeKb": 0},
3980 "test-compile": {"status": "ok", "tookMs": 1899, "warnings": 1, "errors": 0, "sourceVersion": "3.8"},
3981 "test": {"status": "ok", "tookMs": 7292, "passed": 72, "failed": 0, "ignored": 0, "skipped": 0, "total": 72, "byFramework": [{"framework": "unknown", "stats": {"passed": 72, "failed": 0, "ignored": 0, "skipped": 0, "total": 72}}]},
3982 "publish": {"status": "skipped", "tookMs": 0},
3983 "metadata": {
3984 "crossScalaVersions": ["2.12.18", "2.13.12", "3.3.0"]
3985}
3986}]
3987************************
3988[success] Total time: 120 s (0:02:00.0), completed Jan 13, 2026, 5:23:10 PM
3989[0JChecking patch project/plugins.sbt...
3990Checking patch project/build.properties...
3991Checking patch build.sbt...
3992Applied patch project/plugins.sbt cleanly.
3993Applied patch project/build.properties cleanly.
3994Applied patch build.sbt cleanly.