Your message dated Tue, 17 Mar 2026 11:34:36 +0000
with message-id <[email protected]>
and subject line Bug#1127667: fixed in dulwich 1.1.0-1
has caused the Debian Bug report #1127667,
regarding dulwich: autopkgtests fail: UNEXPECTED SUCCESS: 
test_verify_invalid_signature
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1127667: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127667
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: dulwich
Version: 0.24.10-1
Severity: serious

https://ci.debian.net/packages/d/dulwich/testing/amd64/68554341/ shows:

UNEXPECTED SUCCESS: test_verify_invalid_signature 
(tests.test_signature.GPGSignatureVendorTests.test_verify_invalid_signature)
Test that verify raises an error for invalid signatures.

Looking at 
https://salsa.debian.org/python-team/packages/dulwich/-/blob/debian/main/debian/patches/03_fix_gpg_signature_verification_test,
 
the second paragraph of the description ("This patch also ensures that 
all GPGMEError exceptions (not just BadSignatures) are properly caught 
and wrapped in BadSignature exceptions") doesn't seem to match the 
actual patch.  Jelmer, is it possible you forgot to add part of the 
patch?

Thanks,

-- 
Colin Watson (he/him)                              [[email protected]]

-- System Information:
Debian Release: forky/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: arm64

Kernel: Linux 6.18.5+deb14-amd64 (SMP w/12 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

--- End Message ---
--- Begin Message ---
Source: dulwich
Source-Version: 1.1.0-1
Done: Jelmer Vernooij <[email protected]>

We believe that the bug you reported is fixed in the latest version of
dulwich, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jelmer Vernooij <[email protected]> (supplier of updated dulwich package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 17 Mar 2026 09:56:52 +0000
Source: dulwich
Architecture: source
Version: 1.1.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Python Team <[email protected]>
Changed-By: Jelmer Vernooij <[email protected]>
Closes: 1127667
Changes:
 dulwich (1.1.0-1) unstable; urgency=medium
 .
   [ Colin Watson ]
   * Breaks: python3-poetry (<< 2.3.0).
 .
   [ Jelmer Vernooij ]
   * New upstream release.
   * Add patch 04_support_pyo3_0.28: add support for PyO3 0.28.
   * Fix patch 03_fix_gpg_signature_verification_test to also catch
     non-BadSignatures GPGMEError exceptions. Closes: #1127667
Checksums-Sha1:
 f71cd6d64fc12914cf9da6c4a4aa85e09167c96e 2251 dulwich_1.1.0-1.dsc
 0219c0b7f602936662d63f4d622ec06b1dc24213 1171020 dulwich_1.1.0.orig.tar.gz
 901a2dd58e827d72065158731495fe36efaafa97 9840 dulwich_1.1.0-1.debian.tar.xz
 5da5ce913a6b15eec2d4788f45b62047b265ec0c 34421 dulwich_1.1.0-1_source.buildinfo
Checksums-Sha256:
 9a20ddb8955112f095ab942470d7494cfaacc615810d2e6d598a8745a7662be1 2251 
dulwich_1.1.0-1.dsc
 97bd7c95a392881f2ae5d1bb775c4614ba34cf50df08653db00ad105b889fb59 1171020 
dulwich_1.1.0.orig.tar.gz
 222a43641fe87448a59b0549e0d95eaf5c095fd9baa202b75d52762f455a5bed 9840 
dulwich_1.1.0-1.debian.tar.xz
 ac4348dff531a5f7180bb2fcb53b0e370e3051f8ff9adc250ec0936b8e044db5 34421 
dulwich_1.1.0-1_source.buildinfo
Files:
 cca1936e6441fe0ce15576d0deaec3d9 2251 python optional dulwich_1.1.0-1.dsc
 024cdfe6dc336de34dcf2d2f0684a1aa 1171020 python optional 
dulwich_1.1.0.orig.tar.gz
 e9031801eb2808ca4ab3cb84a8888ca4 9840 python optional 
dulwich_1.1.0-1.debian.tar.xz
 2959547f729f17c1dba17b145b798101 34421 python optional 
dulwich_1.1.0-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQFGBAEBCgAwFiEE45ORIHAv6kHRgdNzhp0ktO57TaYFAmm5OLkSHGplbG1lckBk
ZWJpYW4ub3JnAAoJEIadJLTue02mUXIH/20GBJ7ebPMB6s2jDRcCeMxizL97KFRW
uwRnTjW3aEiCJN/i0QMb/mVj+zMCQR0QKvw777S0oqv6bphzwKcpzz6WB1vrQwjr
0qlPuDcy7LMpPCaY2hPcoAd4vsEslqUj5Qm/0l7NO6GrhxJ+g3wNWAqILRNhx5tk
oLUgb6XHgRytQXDda2r943psJ0L0XSjwBBxphF1KXDy437Wp8kJWB5levmuvk8vY
Eo6WcIEJgbKp74fusPjqU++tdW34dMzes+fovFGCwv/dpxx76FV8NMXyOO0qnh+z
aEOTYNDc6UIKjWyC/Slwpm1kh8A6uLqfGBpjgoMnYk0zk1HnSBRo648=
=fX64
-----END PGP SIGNATURE-----

Attachment: pgpcAm_5vzrr8.pgp
Description: PGP signature


--- End Message ---

Reply via email to