Bug 167902 - Corrupt gpg key in package
Summary: Corrupt gpg key in package
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Fedora Infrastructure
Classification: Retired
Component: other
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Bill Nottingham
QA Contact: Bill Nottingham
URL:
Whiteboard:
: 162302 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2005-09-09 11:13 UTC by Kenneth Porter
Modified: 2014-03-17 02:55 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2008-05-16 20:57:28 UTC
Embargoed:


Attachments (Terms of Use)

Description Kenneth Porter 2005-09-09 11:13:55 UTC
Attempting to install anaconda-help with "yum install anaconda-help" (using a
local repository) results in the following error message:

warning: rpmts_HdrFromFdno: Header V3 DSA signature: NOKEY, key ID db42a60e
public key not available for anaconda-help-10.1.0-1.noarch.rpm
Retrieving GPG key from file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora

The GPG key at file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora (0x4F2A6FD2)
is already installed but is not the correct key for this package.
Check that this is the correct key for the "Fedora Core 4 - i386 - Base" repository.

Comment 1 Kenneth Porter 2005-09-09 11:15:27 UTC
Workaround is to temporarily set gpgcheck=0 in /etc/yum.repos.d/fedora.repo.

Comment 2 Paul Nasrat 2005-09-09 11:41:05 UTC
Due to the way the tree inheritence works some ( a very small number of noarch)
packages ended up not being rebuilt so are signed with the Red Hat key

rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY

Bill, I'm pretty sure something like repoclosure could pick this up pre ship to
prevent this in FC5

Comment 3 Bill Nottingham 2005-09-09 18:52:42 UTC
Repoclosure can check sigs?

Comment 4 Paul Nasrat 2005-09-09 19:03:35 UTC
If it can't atm it shouldn't be too painful

Comment 5 Bill Nottingham 2005-09-09 19:24:55 UTC
Hm, I don't see the signature in the repodata anywhere. Perhaps I'm looking at
the wrong place?

Comment 6 Paul Nasrat 2005-09-09 19:44:49 UTC
No we'd have to download the headers and run a test transaction but it's not a
hard script to write with the yum api. I'll see if I can knock something up over
the weekend.

Comment 7 Bill Nottingham 2005-09-09 19:47:54 UTC
Why not embrace and extend the metadata format with the key the package is
signed with?

Comment 8 Seth Vidal 2005-09-12 23:44:16 UTC
What good would it do to put the key in the metadata?

Just so you can check the repo based on the metadata? why not make repo
maintainers take some care in creating their repositories?


Comment 9 Bill Nottingham 2005-09-13 03:52:50 UTC
Having it in the metadata makes it easy to check at the same time that you're
checking a repo for dependency closure, and other sanity checks.

Comment 10 Bill Nottingham 2005-10-31 20:07:48 UTC
*** Bug 162302 has been marked as a duplicate of this bug. ***

Comment 11 Bill Nottingham 2008-05-16 20:57:28 UTC
Closing, I don't think we're going to do this.


Note You need to log in before you can comment on or make changes to this bug.