On 19/01/2026 14:57, Neal Gompa wrote:
On Mon, Jan 19, 2026 at 8:45 AM Petr Menšík <[email protected]> wrote:
On 19/01/2026 14:04, Neal Gompa wrote:
Ehh, it happens. I just switch back as part of replying in-line.
Also: %{gpgverify} is the macro we use to verify signatures. Something
has to provide that macro, and something has to provide what that macro
needs.
RHEL >= 9 has %{gpgverify} already. That is not the problem. Problem is it
requires different package to provide it. In RHEL that macro is provided by
redhat-rpm-config package, where also verification script very similar to the
gpgverify lived.
I would have to put into spec special conditions, if I want to build the same
spec with the older RHEL too. Something like:
%if 0%{?rhel} >= 9 && 0%{?rhel} < 11
BuildRequires: gnupg2
%else
BuildRequires: gpgverify
%fi
But perhaps we can only add Provides: gpgverify into existing gnupg2 package on
RHEL < 11. Everything else can remain unmodified and it would allow to build
Fedora spec files also for RHEL10 or RHEL9, where %{gpgverify} macro is already
present. Even without EPEL repository enabled.
It would need a higher version of gpgverify to be preferred, which it is not
higher now. I think using epoch in gpgverify or using intentionally lower
version in Provides: gpgverify = 0.%{version} from gnupg2 spec should solve it.
That should ensure epel version is chosen when epel repo is available, but
would build even with RHEL/CentOS repositories only.
If CentOS does not have gpgverify then that is where the problem needs be
solved. Abstracting things (in a macro and a single-purpose package) but
than "require"ing a concrete implementation and full suite from each
package was never right.
RHEL9 and RHEL10 are red herrings for any discussion about the present
and future of Fedora - simply because they are based on Fedora's past.
And regardless, if RHEL or EPEL really wants this, it'll get
backported eventually.
Adding a new RHEL component is not a simple process. It is even more
complicated than full Fedora Review. But maybe some workaround can be found,
like fake provides from gnupg2. That should be simple enough to create. I think
adding a 2 kilobytes of bash code is not probably worth it.
Created PR:
https://gitlab.com/redhat/centos-stream/rpms/gnupg2/-/merge_requests/19
Jakube, what do you think about such workaround? I think it will be sufficient,
unless gpgverify is added as a proper component to CRB repostory (and removed
from EPEL then). I think this way would be easier for everyone.
The easier thing to do would be to update redhat-rpm-config in RHEL,
not do weird things to the gnupg2 package.
Can you make example, what change in redhat-rpm-config in RHEL would
help? I want to have my rawhide branch spec file with latest version
built on CentOS 10, for example.
redhat-rpm-config on that version already provides %gpgverify macro, but
expects gnupg2 is in BuildRequires: of the spec. gpgv2 symlink to gpgv
is used by the shell script packaged in redhat-rpm-config.
I think we do not need changes to %gpgverify script, but in
BuildRequires. That never was in a form of macro and then cannot be
changed by macro definition.
Adding alias to gnupg2 package will ensure shell script in
/usr/lib/rpm/redhat/gpgverify can find gpgv2 even with BuildRequires:
gpgverify, according to latest Packaging guidelines. We do not have
separate guidelines for RHEL and look into Fedora's often.
This should be the most minimal way possible, improving the current
situation. Of course adding gpgverify to RHEL itself is a better
variant, but I would not call it minimal in that case.
--
Petr Menšík
Senior Software Engineer, RHEL
Red Hat, https://www.redhat.com/
PGP: DFCF908DB7C87E8E529925BC4931CA5B6C9FC5CB
--
_______________________________________________
devel mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it:
https://pagure.io/fedora-infrastructure/new_issue