Of course this would "solve" issue with GPG signature. It opens door for man-in-the-middle attack without any protection. But I am aware there are no many better fixes. There is one with arch symlink, allowing continued GPG verification. On 8/25/20 5:56 PM, Mattia Verga via devel wrote: > Il 25/08/20 11:40, Petr Menšík ha scritto: >> Hi Vít, >> >> Unfortunately your workaround does not on my rawhide container. >> ... > > I just did > > ~~~ > > $ sudo dnf update fedora-gpg-keys --nogpgcheck > > $ sudo dnf update fedora-repos --release 34 > > ~~~ > > _______________________________________________ > devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx > To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx > Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines > List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx > -- Petr Menšík Software Engineer Red Hat, http://www.redhat.com/ email: pemensik@xxxxxxxxxx PGP: DFCF908DB7C87E8E529925BC4931CA5B6C9FC5CB
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________ devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx