Of course this would "solve" issue with GPG signature. It opens door for
man-in-the-middle attack without any protection. But I am aware there
are no many better fixes. There is one with arch symlink, allowing
continued GPG verification.

On 8/25/20 5:56 PM, Mattia Verga via devel wrote:
> Il 25/08/20 11:40, Petr Menšík ha scritto:
>> Hi Vít,
>>
>> Unfortunately your workaround does not on my rawhide container.
>> ...
> 
> I just did
> 
> ~~~
> 
> $ sudo dnf update fedora-gpg-keys --nogpgcheck
> 
> $ sudo dnf update fedora-repos --release 34
> 
> ~~~
> 
> _______________________________________________
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: 
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives: 
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
> 

-- 
Petr Menšík
Software Engineer
Red Hat, http://www.redhat.com/
email: pemen...@redhat.com
PGP: DFCF908DB7C87E8E529925BC4931CA5B6C9FC5CB

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org

Reply via email to