Pacman cannot handle armored signatures, so force a generation of a
binary one using the --no-armor flag.

---
 commitpkg.in | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/commitpkg.in b/commitpkg.in
index 1095006..d779e96 100644
--- a/commitpkg.in
+++ b/commitpkg.in
@@ -147,7 +147,7 @@ for _arch in ${arch[@]}; do
                        if [[ -n $GPGKEY ]]; then
                                SIGNWITHKEY="-u ${GPGKEY}"
                        fi
-                       gpg --detach-sign --use-agent ${SIGNWITHKEY} 
"${pkgfile}" || die
+                       gpg --detach-sign --use-agent --no-armor ${SIGNWITHKEY} 
"${pkgfile}" || die
                fi
                if ! gpg --verify "$sigfile" >/dev/null 2>&1; then
                        die "Signature %s.sig is incorrect!" "$pkgfile"
-- 
2.4.1

Reply via email to