Glad to announce D 2.099.1, ♥ to the 12 contributors.
http://dlang.org/download.html
This point release fixes a few issues over 2.099.0, see the changelog for more details.
http://dlang.org/changelog/2.099.1.html
-Martin
Thread overview | ||||||
---|---|---|---|---|---|---|
|
April 07, 2022 Release D 2.099.1 | ||||
---|---|---|---|---|
| ||||
Glad to announce D 2.099.1, ♥ to the 12 contributors. http://dlang.org/download.html This point release fixes a few issues over 2.099.0, see the changelog for more details. http://dlang.org/changelog/2.099.1.html -Martin |
April 08, 2022 Re: Release D 2.099.1 | ||||
---|---|---|---|---|
| ||||
Posted in reply to Martin Nowak | On Thursday, 7 April 2022 at 21:32:34 UTC, Martin Nowak wrote: >Glad to announce D 2.099.1, ♥ to the 12 contributors. http://dlang.org/download.html This point release fixes a few issues over 2.099.0, see the changelog for more details. http://dlang.org/changelog/2.099.1.html -Martin Getting signature errors.
|
April 12, 2022 Re: Release D 2.099.1 | ||||
---|---|---|---|---|
| ||||
Posted in reply to Sebastiaan Koppe | On Friday, 8 April 2022 at 09:33:47 UTC, Sebastiaan Koppe wrote: > On Thursday, 7 April 2022 at 21:32:34 UTC, Martin Nowak wrote: >> Glad to announce D 2.099.1, ♥ to the 12 contributors. >> >> http://dlang.org/download.html >> >> This point release fixes a few issues over 2.099.0, see the >> changelog for more details. >> >> http://dlang.org/changelog/2.099.1.html >> >> -Martin > > Getting signature errors. > > ``` > $ curl -fsS https://dlang.org/install.sh | bash -s dmd > Downloading and unpacking > http://downloads.dlang.org/releases/2.x/2.099.1/dmd.2.099.1.linux.tar.xz > ######################################################################## 100.0% > gpg: Signature made Thu Apr 7 16:35:02 2022 UTC > gpg: using EDDSA key > 27637885C3CF8350732A1CA5723DC8887F97C07F > gpg: Can't check signature: No public key > Invalid signature > http://downloads.dlang.org/releases/2.x/2.099.1/dmd.2.099.1.linux.tar.xz.sig > ``` Mr. Nowak had a key expired in March and has made a new one. The fingerprints were/are F46A10D0AB44C3D15DD65797BCDD73FFC3EB6146 (rsa4096 2020-03-12 [SC] [expired: 2022-03-12]) F8A26D5D7572ECA06EC7973182C52E37A8BC8393 (ed25519 2022-03-22 [SC] [expires: 2024-03-21]) The latter I think signs the release and can be fetched with id 82C52E37A8BC8393 |
April 22, 2022 Re: Release D 2.099.1 | ||||
---|---|---|---|---|
| ||||
Posted in reply to sunshine | On Tuesday, 12 April 2022 at 22:06:36 UTC, sunshine wrote:
> On Friday, 8 April 2022 at 09:33:47 UTC, Sebastiaan Koppe wrote:
> > On Thursday, 7 April 2022 at 21:32:34 UTC, Martin Nowak wrote:
> >> Glad to announce D 2.099.1, ♥ to the 12 contributors.
> >>
> >> http://dlang.org/download.html
> >>
> >> This point release fixes a few issues over 2.099.0, see the
> >> changelog for more details.
> >>
> >> http://dlang.org/changelog/2.099.1.html
> >>
> >> -Martin
> >
> > Getting signature errors.
> >
> > ```
> > $ curl -fsS https://dlang.org/install.sh | bash -s dmd
> > Downloading and unpacking
> > http://downloads.dlang.org/releases/2.x/2.099.1/dmd.2.099.1.linux.tar.xz
> > ######################################################################## 100.0%
> > gpg: Signature made Thu Apr 7 16:35:02 2022 UTC
> > gpg: using EDDSA key
> > 27637885C3CF8350732A1CA5723DC8887F97C07F
> > gpg: Can't check signature: No public key
> > Invalid signature
> > http://downloads.dlang.org/releases/2.x/2.099.1/dmd.2.099.1.linux.tar.xz.sig
> > ```
> Mr. Nowak had a key expired in March and has made a new one. The fingerprints were/are
> F46A10D0AB44C3D15DD65797BCDD73FFC3EB6146 (rsa4096 2020-03-12 [SC] [expired: 2022-03-12])
> F8A26D5D7572ECA06EC7973182C52E37A8BC8393 (ed25519 2022-03-22 [SC] [expires: 2024-03-21])
>
> The latter I think signs the release and can be fetched with id 82C52E37A8BC8393
How to retrieve this key? I tried
gpg --recv-keys 82C52E37A8BC8393
and
gpg --keyserver keyserver.ubuntu.com --recv-keys 82C52E37A8BC8393
No luck with either. The resulting error for both is:
gpg: keyserver receive failed: Network is unreachable
What is the correct --keyserver for the public keys used to verify these binaries?
Thanks
|