Hi Nicholas,

Nicholas D Steeves <s...@debian.org> writes:

> Control: owner -1 !
>
> Xiyue Deng <manp...@gmail.com> writes:
>
>>    [ Xiyue Deng ]
>>    * New upstream release.
>>    * Re-export upstream signing key without extra signatures.
>
> $ uscan --download-current-version 
> Newest version of persist-el on remote site is 0.6, specified download 
> version is 0.6
> gpgv: Signature made Sat 13 Jan 2024 05:05:03 EST
> gpgv:                using RSA key C433554766D3DDC64221BFAA066DAFCB81E42C40
> gpgv: Good signature from "GNU ELPA Signing Agent (2019) 
> <elpas...@elpa.gnu.org>"
> gpgv: Signature made Sat 13 Jan 2024 05:05:03 EST
> gpgv:                using EDDSA key 0327BE68D64D9A1A66859F15645357D2883A0966
> gpgv: Can't check signature: No public key
> uscan die: OpenPGP signature did not verify. at 
> /usr/share/perl5/Devscripts/Uscan/Output.pm line 77.

I have been in contact with upstream maintainer Joseph Turner
<persist...@breatheoutbreathe.in> about this issue.  He replied that he
recently took over the maintenance of persist and was not aware about
this key either.  I have followed his suggestion and filed a bug report
to bug-gnu-em...@gnu.org about this issue[1].

Meanwhile, as the RSA key signature is good, I resorted to use "uscan
--skip-signature" to get the current version, dropped the GFDL document
source and repacked the source tarball.  Hope this process sounds ok to
you.

-- 
Xiyue Deng

[1] https://debbugs.gnu.org/cgi/bugreport.cgi?bug=70003

Reply via email to