On 2026/02/18 15:00, Panu Matilainen wrote:
On 2/18/26 2:27 PM, Cristian Le via devel wrote:
On 2026/02/11 16:06, Panu Matilainen wrote:
Hi Panu,
I can now confirm that we are indeed hitting this issue. Afaik we did
set gpgcheck=0, and I am now digging into the code to confirm this.
Here are some failed jobs to reference:
- Copr artifact: https://artifacts.dev.testing-farm.io/
d3f1db58-2964-42d0-be60-9c6023d6acd4/ (inside "Copr build(s)
installation" -> "6-Install-pakcages.txt")
- Koji artifact: https://artifacts.dev.testing-farm.io/
a33f815a-9021-42d0-8fa5-8afefcc8da44/
Also see the "4-Add-repository.txt" I do see `gpgcheck=0`.
Okay so here at least, the issue is that the package file that is
failing the check is specified on the command line directly, so no
repository configuration affects that.
Thanks, I've highlighted that issue. It is partly an implementation
issue because we are somehow trying to make sure the exact rpms are
being used instead of relying on the priority, --from-repo, etc. flags.
We'll keep that in mind in the redesign.
Note that this package IS signed, it's just that the key is not imported:
- package
python3-scikit-build-core-0.11.6-1.20260217085946639536.pr1219.48.g8dce8a6.fc45.noarch
does not verify: Header OpenPGP V4 RSA/SHA256 signature, key ID
e2b551f502810203: NOKEY
The test is downloading the copr repo definition which includes the
key info as well:
gpgkey=https://download.copr.fedorainfracloud.org/results/packit/scikit-build-scikit-build-core-1219/pubkey.gpg
Thanks, it seems that that is not set properly, will try to see if we
can add it for the future.
The brute-force variant is of course to just disable signature
checking for that bit.
One would expect --setopt=localpkg_gpgcheck=false to the command line
bypass that, but that doesn't seem to work. Which would be a dnf bug.
I'll have a look.
Hmm, that goes for --no-gpgchecks as well. Which was intentional back
in 2018 but not so much now.
Hmm, but are all installation from @Commandline supposed to be signed
and checked with the new change proposal?
To workaround, override the rpm policy in the test running
environment, as per the change docs:
# echo '%_pkgverify_level digest' > /etc/rpm/macros.verify
This might be the best approach. Just to double check,
`/etc/rpm/macros.verify` was something that was newly introduced with
this proposal and it is ok to completely overwrite it?
--
_______________________________________________
devel mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it:
https://forge.fedoraproject.org/infra/tickets/issues/new