Of course this would "solve" issue with GPG signature. It opens door for man-in-the-middle attack without any protection. But I am aware there are no many better fixes. There is one with arch symlink, allowing continued GPG verification.
On 8/25/20 5:56 PM, Mattia Verga via devel wrote: > Il 25/08/20 11:40, Petr Menšík ha scritto: >> Hi Vít, >> >> Unfortunately your workaround does not on my rawhide container. >> ... > > I just did > > ~~~ > > $ sudo dnf update fedora-gpg-keys --nogpgcheck > > $ sudo dnf update fedora-repos --release 34 > > ~~~ > > _______________________________________________ > devel mailing list -- devel@lists.fedoraproject.org > To unsubscribe send an email to devel-le...@lists.fedoraproject.org > Fedora Code of Conduct: > https://docs.fedoraproject.org/en-US/project/code-of-conduct/ > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines > List Archives: > https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org > -- Petr Menšík Software Engineer Red Hat, http://www.redhat.com/ email: pemen...@redhat.com PGP: DFCF908DB7C87E8E529925BC4931CA5B6C9FC5CB
signature.asc
Description: OpenPGP digital signature
_______________________________________________ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org