Hi Vincent,

much thanks for the review.

On 10.08.2014 14:54, Vincent Bernat wrote:
Not much to say. Are you sure that upstream-signing-key.pgp is at the
right location? The manual page for uscan still says
debian/upstream/signing-key.pgp. When I try, I get:

Newest version on remote site is 0.3.9, local version is 0.3.9
  => Forcing download as requested
-- Downloading updated package python-djvulibre-0.3.9.tar.gz
-- Downloading OpenPGP signature for package as 
python-djvulibre-0.3.9.tar.gz.pgp
-- Verifying OpenPGP signature python-djvulibre-0.3.9.tar.gz.pgp for 
python-djvulibre-0.3.9.tar.gz
gpgv: Signature made lun. 19 mars 2012 21:02:31 CET using RSA key ID 015475F5
gpgv: [don't know]: invalid packet (ctb=2d)
gpgv: keydb_search failed: invalid packet
gpgv: Can't check signature: public key not found
uscan warning: OpenPGP signature did not verify.

Yes, that doesn't work: it's not the developer's public key. Corrected.

<cut>
-- Downloading OpenPGP signature for package as python-djvulibre-0.3.9.tar.gz.pgp -- Verifying OpenPGP signature python-djvulibre-0.3.9.tar.gz.pgp for python-djvulibre-0.3.9.tar.gz
gpgv: Signature made Mo 19 Mär 2012 21:02:31 CET using RSA key ID 015475F5
gpgv: Good signature from "Jakub Wilk <jw...@jwilk.net>"
gpgv:                 aka "Jakub Wilk <jw...@debian.org>"
gpgv:                 aka "Jakub Wilk <uba...@users.sf.net>"
gpgv:                 aka "[invalid image]"
-- Successfully downloaded updated package python-djvulibre-0.3.9.tar.gz
-- Successfully renamed /tmp/python-djvulibre-0.3.9.tar.gz to /tmp/python-djvulibre_0.3.9.orig.tar.gz.
-- Scan finished
</cut>

Also, you may want to remove debian/patches when it is empty.

Removed.

Greetings,
Daniel

--
http://www.danielstender.com/blog/
PGP key: 2048R/E41BD2D0
C879 5E41 1ED7 EE80 0F2E 7D0C DBDD 4D96 E41B D2D0


--
To UNSUBSCRIBE, email to debian-mentors-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53e77d3a.20...@danielstender.com

Reply via email to