Your message dated Thu, 19 Mar 2026 13:06:29 +0000
with message-id <[email protected]>
and subject line Bug#1131202: fixed in dulwich 1.1.0-2
has caused the Debian Bug report #1131202,
regarding dulwich: FTBFS: AssertionError: BadSignature not raised
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1131202: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131202
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: src:dulwich
Version: 1.1.0-1
Severity: serious
Tags: ftbfs forky sid
Dear maintainer:
During a rebuild of all packages in unstable, this package failed to build.
Below you will find the last part of the build log (probably the most
relevant part, but not necessarily). If required, the full build log
is available here:
https://people.debian.org/~sanvila/build-logs/202603/
About the archive rebuild: The build was made on virtual machines from AWS,
using sbuild and a reduced chroot with only build-essential packages.
If you cannot reproduce the bug please contact me privately, as I
am willing to provide ssh access to a virtual machine where the bug is
fully reproducible.
If this is really a bug in one of the build-depends, please use
reassign and add an affects on src:dulwich, so that this is still
visible in the BTS web page for this package.
Thanks.
--------------------------------------------------------------------------------
[...]
======================================================================
ERROR: test_default_key (tests.porcelain.CommitSignTests.test_default_key)
----------------------------------------------------------------------
Traceback (most recent call last):
File "/<<PKGBUILDDIR>>/tests/porcelain/__init__.py", line 686, in
test_default_key
self.assertRaises(
~~~~~~~~~~~~~~~~~^
BadSignature,
^^^^^^^^^^^^^
...<2 lines>...
commit.gpgsig,
^^^^^^^^^^^^^^
)
^
File "/usr/lib/python3.13/unittest/case.py", line 795, in assertRaises
return context.handle('assertRaises', args, kwargs)
~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3.13/unittest/case.py", line 238, in handle
callable_obj(*args, **kwargs)
~~~~~~~~~~~~^^^^^^^^^^^^^^^^^
File "/<<PKGBUILDDIR>>/dulwich/signature.py", line 279, in verify
_verified_data, result = ctx.verify(
~~~~~~~~~~^
data,
^^^^^
signature=signature,
^^^^^^^^^^^^^^^^^^^^
)
^
File "/usr/lib/python3/dist-packages/gpg/core.py", line 558, in verify
raise errors.BadSignatures(results[1], results=results)
gpg.errors.BadSignatures: 7CDD800A52E65E26: Bad signature
======================================================================
ERROR: test_default_key (tests.porcelain.TagCreateSignTests.test_default_key)
----------------------------------------------------------------------
Traceback (most recent call last):
File "/<<PKGBUILDDIR>>/tests/porcelain/__init__.py", line 3355, in
test_default_key
self.assertRaises(
~~~~~~~~~~~~~~~~~^
BadSignature,
^^^^^^^^^^^^^
...<2 lines>...
tag.signature,
^^^^^^^^^^^^^^
)
^
File "/usr/lib/python3.13/unittest/case.py", line 795, in assertRaises
return context.handle('assertRaises', args, kwargs)
~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3.13/unittest/case.py", line 238, in handle
callable_obj(*args, **kwargs)
~~~~~~~~~~~~^^^^^^^^^^^^^^^^^
File "/<<PKGBUILDDIR>>/dulwich/signature.py", line 279, in verify
_verified_data, result = ctx.verify(
~~~~~~~~~~^
data,
^^^^^
signature=signature,
^^^^^^^^^^^^^^^^^^^^
)
^
File "/usr/lib/python3/dist-packages/gpg/core.py", line 558, in verify
raise errors.BadSignatures(results[1], results=results)
gpg.errors.BadSignatures: 7CDD800A52E65E26: Bad signature
======================================================================
FAIL: test_verify_invalid_signature
(tests.test_signature.GPGSignatureVendorTests.test_verify_invalid_signature)
Test that verify raises an error for invalid signatures.
----------------------------------------------------------------------
Traceback (most recent call last):
File "/<<PKGBUILDDIR>>/tests/test_signature.py", line 151, in
test_verify_invalid_signature
with self.assertRaises(BadSignature):
~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^
AssertionError: BadSignature not raised
----------------------------------------------------------------------
Ran 4063 tests in 148.148s
FAILED (failures=1, errors=2, skipped=191, expected failures=1)
file.txt | 1 +
1 files changed, 1 insertions(+), 0 deletions(-)
self test passed
make[2]: *** [Makefile:26: check] Error 1
make[2]: Leaving directory '/<<PKGBUILDDIR>>'
make[1]: *** [debian/rules:16: override_dh_auto_test] Error 2
make[1]: Leaving directory '/<<PKGBUILDDIR>>'
make: *** [debian/rules:12: binary] Error 2
dpkg-buildpackage: error: debian/rules binary subprocess failed with exit
status 2
--------------------------------------------------------------------------------
--- End Message ---
--- Begin Message ---
Source: dulwich
Source-Version: 1.1.0-2
Done: Jelmer Vernooij <[email protected]>
We believe that the bug you reported is fixed in the latest version of
dulwich, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Jelmer Vernooij <[email protected]> (supplier of updated dulwich package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 19 Mar 2026 12:14:36 +0000
Source: dulwich
Architecture: source
Version: 1.1.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Python Team <[email protected]>
Changed-By: Jelmer Vernooij <[email protected]>
Closes: 1131202
Changes:
dulwich (1.1.0-2) unstable; urgency=medium
.
* Update patch 03_fix_gpg_signature_verification_test:
another attempt to fix test failures. Closes: #1131202
Checksums-Sha1:
f47c64ba3757146a7206117379f886a1d61708e3 2251 dulwich_1.1.0-2.dsc
742e110d98f5f1395a7ee95ecc583c45d23e6e34 9908 dulwich_1.1.0-2.debian.tar.xz
4f978873d10800efc2cf091ef0397829624ae770 34396 dulwich_1.1.0-2_source.buildinfo
Checksums-Sha256:
5418edbe4b7070271e3c42b568c1ae85feb05932d99996e8577dd7ec3c85822b 2251
dulwich_1.1.0-2.dsc
83fc143cde6e167aa111480337fbbaaac0e0c23717dfba745d94a2d6e253b88f 9908
dulwich_1.1.0-2.debian.tar.xz
a9ca0516f82e2befaa87c899b9ad439641ab9aa63604122289ccc07ba6ea6b8b 34396
dulwich_1.1.0-2_source.buildinfo
Files:
99a1e2a8b4660b5cd361e9f918f39166 2251 python optional dulwich_1.1.0-2.dsc
55ba3a6dd69acb493cd7b06b91334149 9908 python optional
dulwich_1.1.0-2.debian.tar.xz
9b5f4775bbc94e4738dc2ac0feed16f6 34396 python optional
dulwich_1.1.0-2_source.buildinfo
-----BEGIN PGP SIGNATURE-----
iQFGBAEBCgAwFiEE45ORIHAv6kHRgdNzhp0ktO57TaYFAmm77J0SHGplbG1lckBk
ZWJpYW4ub3JnAAoJEIadJLTue02mW3QIAJPpW3TmvRZ9pCyLMQtLDOVL3c+vOzGj
I2zoXoFH9ByVAQkisVKciaU3VuYi7IBLrVdkWcZRIjvg969JJqFM4ifeQxjHLcD0
PBW84GkaqCnvhghGOeynSEdPc8zK0KK0M5GuzyxTX1nweswTeTMGMCxkbsCt7kg7
PFlQr3ubbyn0csBsPcUreJEgW+4n02Md41abBTj2/t37FczCKvBPInJMEWfoqMF6
hw9jC+/uvccaWUsdWtlCG2KjvjrBIwv2em85KChegfxQ2povMQVTdEX5152cDoLD
ojlSK+04gSI+duoxZ9a/BH1ywFOrT2x50C0r5qvMzX2MfbaDoNuytPM=
=VGPb
-----END PGP SIGNATURE-----
pgpoim8E8FgRD.pgp
Description: PGP signature
--- End Message ---