On 2/18/26 4:13 PM, Cristian Le via devel wrote:

On 2026/02/18 15:00, Panu Matilainen wrote:
On 2/18/26 2:27 PM, Cristian Le via devel wrote:
On 2026/02/11 16:06, Panu Matilainen wrote:

Hi Panu,

I can now confirm that we are indeed hitting this issue. Afaik we did set gpgcheck=0, and I am now digging into the code to confirm this.

Here are some failed jobs to reference:
- Copr artifact: https://artifacts.dev.testing-farm.io/ d3f1db58-2964-42d0-be60-9c6023d6acd4/ (inside "Copr build(s) installation" -> "6-Install-pakcages.txt") - Koji artifact: https://artifacts.dev.testing-farm.io/ a33f815a-9021-42d0-8fa5-8afefcc8da44/

Also see the "4-Add-repository.txt" I do see `gpgcheck=0`.

Okay so here at least, the issue is that the package file that is failing the check is specified on the command line directly, so no repository configuration affects that.
Thanks, I've highlighted that issue. It is partly an implementation issue because we are somehow trying to make sure the exact rpms are being used instead of relying on the priority, --from-repo, etc. flags. We'll keep that in mind in the redesign.
Note that this package IS signed, it's just that the key is not imported:
- package python3-scikit-build- core-0.11.6-1.20260217085946639536.pr1219.48.g8dce8a6.fc45.noarch does not verify: Header OpenPGP V4 RSA/SHA256 signature, key ID e2b551f502810203: NOKEY

The test is downloading the copr repo definition which includes the key info as well: gpgkey=https://download.copr.fedorainfracloud.org/results/packit/ scikit-build-scikit-build-core-1219/pubkey.gpg

Thanks, it seems that that is not set properly, will try to see if we can add it for the future.

The issue here is that no repo config will be used for installing a package whose location you specify on the command line. So nothing wrong with how it's set AFAICS, the issue is with the command line *use*.

The brute-force variant is of course to just disable signature checking for that bit.

One would expect --setopt=localpkg_gpgcheck=false to the command line bypass that, but that doesn't seem to work. Which would be a dnf bug.
I'll have a look.

Hmm, that goes for --no-gpgchecks as well. Which was intentional back in 2018 but not so much now.
Hmm, but are all installation from @Commandline supposed to be signed and checked with the new change proposal?

Yes, ALL package installs going through librpm, regardless of the "client" used. So including rpm itself of course, dnf/dnf5, a homegrown python install script - everything.

To workaround, override the rpm policy in the test running environment, as per the change docs:

    # echo '%_pkgverify_level digest' > /etc/rpm/macros.verify
This might be the best approach.

That gives you the exact former behavior if you need time to sort things out. Going forward, it's not the best option.

Just to double check, `/etc/rpm/ macros.verify` was something that was newly introduced with this proposal and it is ok to completely overwrite it?

That file does not normally exist. It's just an arbitrary name for a host-wide rpm configuration macro file.

        - Panu -

--
_______________________________________________
devel mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://forge.fedoraproject.org/infra/tickets/issues/new

Reply via email to