You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
While diagnosing #189, I ran into this test issue:
t/00signature.t ............... gpg: Signature made Sun Nov 17 14:46:46 2024 EST
gpg: using RSA key C40BA553F730173DA63AA20F7EFCE8AC421EE20A
gpg: requesting key 7EFCE8AC421EE20A from hkp://keyserver.ubuntu.com:11371
gpg: Can't check signature: No public key
==> BAD/TAMPERED signature detected! <==
The text was updated successfully, but these errors were encountered:
The error message "BAD/TAMPERED" is likely incorrect, as it is the missing key retrieval that is failing.
Module::Signature likely uses gpg with auto-key-retrieve during the test phase to get the missing key that signed SIGNATURE
The key can instead be bundled with the distribution and imported via gpg --import, but that will modify the users keyring and could be considered unexpected.
Signature checks should be performed before the distribution tarball has been extracted. Doing verification with untrusted code as a part of the check phase would have no security benefits.
Generally, Module::Signature is considered to have a set of design issues that make it unsuitable for package signature verification.
I'd recommend removing the test, M::S dependency and SIGNATURE file.
While diagnosing #189, I ran into this test issue:
The text was updated successfully, but these errors were encountered: