Source: dulwich
Version: 0.24.10-1
Severity: serious

https://ci.debian.net/packages/d/dulwich/testing/amd64/68554341/ shows:

UNEXPECTED SUCCESS: test_verify_invalid_signature 
(tests.test_signature.GPGSignatureVendorTests.test_verify_invalid_signature)
Test that verify raises an error for invalid signatures.

Looking at 
https://salsa.debian.org/python-team/packages/dulwich/-/blob/debian/main/debian/patches/03_fix_gpg_signature_verification_test,
 
the second paragraph of the description ("This patch also ensures that 
all GPGMEError exceptions (not just BadSignatures) are properly caught 
and wrapped in BadSignature exceptions") doesn't seem to match the 
actual patch.  Jelmer, is it possible you forgot to add part of the 
patch?

Thanks,

-- 
Colin Watson (he/him)                              [[email protected]]

-- System Information:
Debian Release: forky/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: arm64

Kernel: Linux 6.18.5+deb14-amd64 (SMP w/12 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Reply via email to