Your message dated Wed, 11 Mar 2026 20:47:39 +0000
with message-id <[email protected]>
and subject line Fixed in 1.0.0
has caused the Debian Bug report #1127667,
regarding dulwich: autopkgtests fail: UNEXPECTED SUCCESS: 
test_verify_invalid_signature
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1127667: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127667
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: dulwich
Version: 0.24.10-1
Severity: serious

https://ci.debian.net/packages/d/dulwich/testing/amd64/68554341/ shows:

UNEXPECTED SUCCESS: test_verify_invalid_signature 
(tests.test_signature.GPGSignatureVendorTests.test_verify_invalid_signature)
Test that verify raises an error for invalid signatures.

Looking at 
https://salsa.debian.org/python-team/packages/dulwich/-/blob/debian/main/debian/patches/03_fix_gpg_signature_verification_test,
 
the second paragraph of the description ("This patch also ensures that 
all GPGMEError exceptions (not just BadSignatures) are properly caught 
and wrapped in BadSignature exceptions") doesn't seem to match the 
actual patch.  Jelmer, is it possible you forgot to add part of the 
patch?

Thanks,

-- 
Colin Watson (he/him)                              [[email protected]]

-- System Information:
Debian Release: forky/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: arm64

Kernel: Linux 6.18.5+deb14-amd64 (SMP w/12 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

--- End Message ---
--- Begin Message ---
Version: 1.0.0-1

This was fixed in 1.0.0

--- End Message ---

Reply via email to