Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package kwctl for openSUSE:Factory checked 
in at 2025-10-17 17:26:26
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/kwctl (Old)
 and      /work/SRC/openSUSE:Factory/.kwctl.new.18484 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "kwctl"

Fri Oct 17 17:26:26 2025 rev:8 rq:1311887 version:1.29.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/kwctl/kwctl.changes      2025-10-02 
19:23:38.803109393 +0200
+++ /work/SRC/openSUSE:Factory/.kwctl.new.18484/kwctl.changes   2025-10-17 
17:28:13.816178670 +0200
@@ -1,0 +2,7 @@
+Tue Oct 14 05:06:15 UTC 2025 - Johannes Kastl 
<[email protected]>
+
+- Update to version 1.29.1:
+  * Backport graceful handling of failures during sigstore init to
+    1.29 by @flavio in #1395
+
+-------------------------------------------------------------------

Old:
----
  kwctl-1.29.0.obscpio

New:
----
  kwctl-1.29.1.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ kwctl.spec ++++++
--- /var/tmp/diff_new_pack.vgxj4j/_old  2025-10-17 17:28:14.964227026 +0200
+++ /var/tmp/diff_new_pack.vgxj4j/_new  2025-10-17 17:28:14.968227194 +0200
@@ -17,7 +17,7 @@
 
 
 Name:           kwctl
-Version:        1.29.0
+Version:        1.29.1
 Release:        0
 Summary:        The go-to CLI tool for Kubewarden users
 License:        Apache-2.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.vgxj4j/_old  2025-10-17 17:28:15.028229722 +0200
+++ /var/tmp/diff_new_pack.vgxj4j/_new  2025-10-17 17:28:15.032229890 +0200
@@ -3,7 +3,7 @@
     <param name="url">https://github.com/kubewarden/kwctl</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="scm">git</param>
-    <param name="revision">v1.29.0</param>
+    <param name="revision">v1.29.1</param>
     <param name="versionrewrite-pattern">v(\d+\.\d+\.\d+)</param>
     <param name="versionrewrite-replacement">\1</param>
     <param name="changesgenerate">enable</param>

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.vgxj4j/_old  2025-10-17 17:28:15.076231744 +0200
+++ /var/tmp/diff_new_pack.vgxj4j/_new  2025-10-17 17:28:15.080231912 +0200
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param name="url">https://github.com/kubewarden/kwctl</param>
-              <param 
name="changesrevision">791f516865f0f111105dd6787356922db38ffd2c</param></service></servicedata>
+              <param 
name="changesrevision">79510d1cc22d5e6422e277755fa9ddb95b54f366</param></service></servicedata>
 (No newline at EOF)
 

++++++ kwctl-1.29.0.obscpio -> kwctl-1.29.1.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kwctl-1.29.0/Cargo.lock new/kwctl-1.29.1/Cargo.lock
--- old/kwctl-1.29.0/Cargo.lock 2025-09-30 14:55:15.000000000 +0200
+++ new/kwctl-1.29.1/Cargo.lock 2025-10-13 11:52:26.000000000 +0200
@@ -3087,7 +3087,7 @@
 
 [[package]]
 name = "kwctl"
-version = "1.29.0"
+version = "1.29.1"
 dependencies = [
  "anyhow",
  "assert_cmd",
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kwctl-1.29.0/Cargo.toml new/kwctl-1.29.1/Cargo.toml
--- old/kwctl-1.29.0/Cargo.toml 2025-09-30 14:55:15.000000000 +0200
+++ new/kwctl-1.29.1/Cargo.toml 2025-10-13 11:52:26.000000000 +0200
@@ -3,7 +3,7 @@
 description = "Tool to manage Kubewarden policies"
 edition     = "2021"
 name        = "kwctl"
-version     = "1.29.0"
+version     = "1.29.1"
 
 # See more keys and their definitions at 
https://doc.rust-lang.org/cargo/reference/manifest.html
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kwctl-1.29.0/src/config/pull_and_run.rs 
new/kwctl-1.29.1/src/config/pull_and_run.rs
--- old/kwctl-1.29.0/src/config/pull_and_run.rs 2025-09-30 14:55:15.000000000 
+0200
+++ new/kwctl-1.29.1/src/config/pull_and_run.rs 2025-10-13 11:52:26.000000000 
+0200
@@ -12,7 +12,7 @@
 use policy_evaluator::policy_fetcher::{
     sigstore::trust::ManualTrustRoot, sources::Sources, 
verify::config::LatestVerificationConfig,
 };
-use tracing::info;
+use tracing::{info, warn};
 
 use crate::{
     callback_handler,
@@ -90,22 +90,41 @@
 
     let sources = remote_server_options(matches)
         .map_err(|e| anyhow!("Error getting remote server options: {}", e))?;
-    let sigstore_trust_root = 
build_sigstore_trust_root(matches.to_owned()).await?;
 
-    let verified_manifest_digests =
-        if let Some(verification_options) = 
build_verification_options(matches)? {
-            Some(
-                build_verified_manifest_digests(
-                    policy_definitions,
-                    &verification_options,
-                    &sources,
-                    sigstore_trust_root.clone(),
-                )
-                .await?,
+    let verification_options = build_verification_options(matches)?;
+
+    let sigstore_trust_root = match 
build_sigstore_trust_root(matches.to_owned()).await {
+        Ok(trust_root) => trust_root,
+        Err(e) => {
+            if verification_options.is_some() {
+                return Err(anyhow!(
+                    "Error building Sigstore trust root: {}. \
+                    Note that verification options were provided, \
+                    so a Sigstore trust root is required.",
+                    e
+                ));
+            } else {
+                warn!(
+                    error=?e, "Cannot create Sigstore trust root, verification 
relying on Rekor and Fulcio will fail"
+                );
+                None
+            }
+        }
+    };
+
+    let verified_manifest_digests = if let Some(verification_options) = 
verification_options {
+        Some(
+            build_verified_manifest_digests(
+                policy_definitions,
+                &verification_options,
+                &sources,
+                sigstore_trust_root.clone(),
             )
-        } else {
-            None
-        };
+            .await?,
+        )
+    } else {
+        None
+    };
 
     let enable_wasmtime_cache = !matches
         .get_one::<bool>("disable-wasmtime-cache")
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kwctl-1.29.0/src/config/verification.rs 
new/kwctl-1.29.1/src/config/verification.rs
--- old/kwctl-1.29.0/src/config/verification.rs 2025-09-30 14:55:15.000000000 
+0200
+++ new/kwctl-1.29.1/src/config/verification.rs 2025-10-13 11:52:26.000000000 
+0200
@@ -218,7 +218,7 @@
             .await?;
         let fulcio_certs: Vec<rustls_pki_types::CertificateDer> = repo
             .fulcio_certs()
-            .expect("no fulcio certs found inside of TUF repository")
+            .map_err(|e| anyhow!("no fulcio certs found inside of TUF 
repository: {:?}", e))?
             .into_iter()
             .map(|c| c.into_owned())
             .collect();
@@ -226,7 +226,7 @@
             fulcio_certs,
             rekor_keys: repo
                 .rekor_keys()
-                .expect("no rekor keys found inside of TUF repository")
+                .map_err(|e| anyhow!("no rekor keys found inside of TUF 
repository: {:?}", e))?
                 .iter()
                 .map(|k| k.to_vec())
                 .collect(),
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kwctl-1.29.0/tests/secure_supply_chain_e2e.rs 
new/kwctl-1.29.1/tests/secure_supply_chain_e2e.rs
--- old/kwctl-1.29.0/tests/secure_supply_chain_e2e.rs   2025-09-30 
14:55:15.000000000 +0200
+++ new/kwctl-1.29.1/tests/secure_supply_chain_e2e.rs   2025-10-13 
11:52:26.000000000 +0200
@@ -14,6 +14,7 @@
 }
 
 #[test]
+#[ignore] // We need to ignore it to make a quick patch release of kwctl - we 
need to fix the sigstore-rs issue first
 fn test_verify_tuf_integration() {
     let tempdir = tempdir().unwrap();
     let mut cmd = setup_command(tempdir.path());
@@ -38,6 +39,7 @@
 }
 
 #[test]
+#[ignore] // We need to ignore it to make a quick patch release of kwctl - we 
need to fix the sigstore-rs issue first
 fn test_verify_fulcio_cert_path() {
     let tempdir = tempdir().unwrap();
     cosign_initialize(tempdir.path());
@@ -58,6 +60,7 @@
 }
 
 #[test]
+#[ignore] // We need to ignore it to make a quick patch release of kwctl - we 
need to fix the sigstore-rs issue first
 fn test_verify_fulcio_cert_path_no_rekor_public_key() {
     let tempdir = tempdir().unwrap();
     cosign_initialize(tempdir.path());
@@ -77,6 +80,7 @@
 }
 
 #[test]
+#[ignore] // We need to ignore it to make a quick patch release of kwctl - we 
need to fix the sigstore-rs issue first
 fn test_verify_rekor_public_key_no_certs() {
     let tempdir = tempdir().unwrap();
     cosign_initialize(tempdir.path());
@@ -96,6 +100,7 @@
 }
 
 #[test]
+#[ignore] // We need to ignore it to make a quick patch release of kwctl - we 
need to fix the sigstore-rs issue first
 fn test_verify_missing_signatures() {
     let tempdir = tempdir().unwrap();
     cosign_initialize(tempdir.path());
@@ -118,6 +123,7 @@
 }
 
 #[test]
+#[ignore] // We need to ignore it to make a quick patch release of kwctl - we 
need to fix the sigstore-rs issue first
 fn test_verify_keyless() {
     let tempdir = tempdir().unwrap();
     cosign_initialize(tempdir.path());
@@ -140,6 +146,7 @@
 }
 
 #[test]
+#[ignore] // We need to ignore it to make a quick patch release of kwctl - we 
need to fix the sigstore-rs issue first
 fn test_verify_scaffolded_verification_config() {
     let tempdir = tempdir().unwrap();
     cosign_initialize(tempdir.path());
@@ -203,6 +210,7 @@
     false,
     contains("Image verification failed: missing signatures")
 )]
+#[ignore] // We need to ignore it to make a quick patch release of kwctl - we 
need to fix the sigstore-rs issue first
 fn test_verify_oci_registry(
     #[case] keys: &[&str],
     #[case] annotations: &[&str],
@@ -245,6 +253,7 @@
     &["sigstore/cosign2.pub"],
     false,contains("Image verification failed: missing signatures")
 )]
+#[ignore] // We need to ignore it to make a quick patch release of kwctl - we 
need to fix the sigstore-rs issue first
 fn test_pull_signed_policy(
     #[case] keys: &[&str],
     #[case] success: bool,
@@ -283,6 +292,7 @@
     false,
     contains("Image verification failed: missing signatures"))
 ]
+#[ignore] // We need to ignore it to make a quick patch release of kwctl - we 
need to fix the sigstore-rs issue first
 fn test_run_signed_policy(
     #[case] keys: &[&str],
     #[case] success: bool,
@@ -321,6 +331,7 @@
     false,
     contains("Image verification failed: missing signatures")
 )]
+#[ignore] // We need to ignore it to make a quick patch release of kwctl - we 
need to fix the sigstore-rs issue first
 fn test_run_signed_policy_verification_config(
     #[case] uri: &str,
     #[case] success: bool,

++++++ kwctl.obsinfo ++++++
--- /var/tmp/diff_new_pack.vgxj4j/_old  2025-10-17 17:28:15.440247076 +0200
+++ /var/tmp/diff_new_pack.vgxj4j/_new  2025-10-17 17:28:15.444247244 +0200
@@ -1,5 +1,5 @@
 name: kwctl
-version: 1.29.0
-mtime: 1759236915
-commit: 791f516865f0f111105dd6787356922db38ffd2c
+version: 1.29.1
+mtime: 1760349146
+commit: 79510d1cc22d5e6422e277755fa9ddb95b54f366
 

++++++ vendor.tar.zst ++++++
/work/SRC/openSUSE:Factory/kwctl/vendor.tar.zst 
/work/SRC/openSUSE:Factory/.kwctl.new.18484/vendor.tar.zst differ: char 12, 
line 1

Reply via email to