Have seen this done before also with few other -git packages
From top of the head mesa-git hijack caused a lot of problems and confusion – ESPECIALLY since it wasn’t even a live -git build helper like AUR version, but rather just a static snapshot that didn’t have anything to do with current git version.
Really wish they did -manjaro version instead of hijacking AUR packages with the same name.
if you specifically installed pulseaudio-modules-bt in the past for high fidelity codecs (aptx-*, ldac, etc.) and looking for alleged pulseaudio 15.0 support for the same its not coming. it only supports SBC and SBC_HQ with arch maintainers dropping support for additional libraries required for the same.
You are making a good point, having it as separate package would make sense. I didn’t think about the fact that the existing installations might be affected.
It is not evil, it was necessary for having timeshift-autosnap in new installations by default. And it was not the only reason. The original seems practically unmaintained, so I took it over. Now we can add any new features we need or want.
timeshift-autosnap-manjaro has replaced timeshift-autosnap in all branches. The latter is still available in the AUR if you don’t want to use the Manjaro version.
@linux-aarhus - Thanks for taking the time to split the thread. I don’t intend to restart the conversation here. This is just letting people know that, I shared the opinion and went to work and couldn’t reply to the thread. Would’ve loved to share my opinions and some answers at least but the thread is locked now.
I am genuinely surprised (seriously not mocking) that my comment wasn’t hidden. So I appreciate the thread anyways.
I have some signature errors and I cannot fix it the usual way. I tried both pamac and pacman.
Here my last attempt after empty the /var/cache/pacman/pkg directory:
(201/201) checking keys in keyring [##################################################################] 100%
(201/201) checking package integrity [##################################################################] 100%
error: nvidia-utils: signature from "Helmut Stult (schinfo) <helmut.stult@schinfo.de>" is unknown trust
:: File /var/cache/pacman/pkg/nvidia-utils-470.57.02-1-x86_64.pkg.tar.zst is corrupted (invalid or corrupted package (PGP signature)).
Do you want to delete it? [Y/n] n
error: 0ad: signature from "Brett Cornwall <brett@i--b.com>" is unknown trust
:: File /var/cache/pacman/pkg/0ad-a24.b-7-x86_64.pkg.tar.zst is corrupted (invalid or corrupted package (PGP signature)).
Do you want to delete it? [Y/n] n
error: libxnvctrl: signature from "Helmut Stult (schinfo) <helmut.stult@schinfo.de>" is unknown trust
:: File /var/cache/pacman/pkg/libxnvctrl-470.57.02-2-x86_64.pkg.tar.zst is corrupted (invalid or corrupted package (PGP signature)).
Do you want to delete it? [Y/n] n
error: linux-firmware: signature from "Helmut Stult (schinfo) <helmut.stult@schinfo.de>" is unknown trust
:: File /var/cache/pacman/pkg/linux-firmware-20210719.r1990.168452e-1-any.pkg.tar.zst is corrupted (invalid or corrupted package (PGP signature)).
Do you want to delete it? [Y/n] n
error: linux512: signature from "Helmut Stult (schinfo) <helmut.stult@schinfo.de>" is unknown trust
:: File /var/cache/pacman/pkg/linux512-5.12.19-1-x86_64.pkg.tar.zst is corrupted (invalid or corrupted package (PGP signature)).
Do you want to delete it? [Y/n] n
error: linux512-headers: signature from "Helmut Stult (schinfo) <helmut.stult@schinfo.de>" is unknown trust
:: File /var/cache/pacman/pkg/linux512-headers-5.12.19-1-x86_64.pkg.tar.zst is corrupted (invalid or corrupted package (PGP signature)).
Do you want to delete it? [Y/n] n
error: linux513: signature from "Helmut Stult (schinfo) <helmut.stult@schinfo.de>" is unknown trust
:: File /var/cache/pacman/pkg/linux513-5.13.5-1-x86_64.pkg.tar.zst is corrupted (invalid or corrupted package (PGP signature)).
Do you want to delete it? [Y/n] n
error: linux513-headers: signature from "Helmut Stult (schinfo) <helmut.stult@schinfo.de>" is unknown trust
:: File /var/cache/pacman/pkg/linux513-headers-5.13.5-1-x86_64.pkg.tar.zst is corrupted (invalid or corrupted package (PGP signature)).
Do you want to delete it? [Y/n] n
error: pacman: signature from "Helmut Stult (schinfo) <helmut.stult@schinfo.de>" is unknown trust
:: File /var/cache/pacman/pkg/pacman-6.0.0-2-x86_64.pkg.tar.zst is corrupted (invalid or corrupted package (PGP signature)).
Do you want to delete it? [Y/n] n
error: mhwd-nvidia-390xx: signature from "Helmut Stult (schinfo) <helmut.stult@schinfo.de>" is unknown trust
:: File /var/cache/pacman/pkg/mhwd-nvidia-390xx-390.144-1-any.pkg.tar.zst is corrupted (invalid or corrupted package (PGP signature)).
Do you want to delete it? [Y/n] n
error: mhwd-nvidia: signature from "Helmut Stult (schinfo) <helmut.stult@schinfo.de>" is unknown trust
:: File /var/cache/pacman/pkg/mhwd-nvidia-470.57.02-1-any.pkg.tar.zst is corrupted (invalid or corrupted package (PGP signature)).
Do you want to delete it? [Y/n] n
error: opencl-nvidia: signature from "Helmut Stult (schinfo) <helmut.stult@schinfo.de>" is unknown trust
:: File /var/cache/pacman/pkg/opencl-nvidia-470.57.02-1-x86_64.pkg.tar.zst is corrupted (invalid or corrupted package (PGP signature)).
Do you want to delete it? [Y/n] n
error: snapd: signature from "Helmut Stult (schinfo) <helmut.stult@schinfo.de>" is unknown trust
:: File /var/cache/pacman/pkg/snapd-2.51.3-2-x86_64.pkg.tar.zst is corrupted (invalid or corrupted package (PGP signature)).
Do you want to delete it? [Y/n] n
error: failed to commit transaction (invalid or corrupted package)
Errors occurred, no packages were upgraded.
Is there some error from my mirror?
❯ pacman-mirrors
Pacman-mirrors version 4.21.2
Local mirror status for stable branch
Mirror #1 OK 05:55 France http://ftp.free.org/mirrors/repo.manjaro.org/repos/
Mirror #2 OK 17:14 France https://manjaro.ynh.ovh/
I ran into the same exact problem when I updated a few days ago. Using sudo pacman -Syu archlinux-keyring manjaro-keyring before doing anything else with the upgrade worked for me.
As far as I know, that key was just expired. Try running sudo pacman-key --refresh-keys (it will take a while), and see if you can proceed with your upgrade.
Ok by doing the steps from Pacman troubleshooting - Manjaro in a different order (1, 3, 4, 5, 6, 2) brings better result but the key from Helmut Stult is still not valid:
❯ sudo pacman -Sy gnupg archlinux-keyring manjaro-keyring
:: Synchronizing package databases...
core is up to date
extra is up to date
community is up to date
multilib is up to date
:: Some packages should be upgraded first...
resolving dependencies...
looking for conflicting packages...
Packages (1) archlinux-keyring-20210802-1
Total Download Size: 0,94 MiB
Total Installed Size: 1,33 MiB
Net Upgrade Size: 0,00 MiB
:: Proceed with installation? [Y/n]
:: Retrieving packages...
archlinux-keyring-20210802-1-any 959,1 KiB 5,20 MiB/s 00:00 [##################################################################] 100%
(1/1) checking keys in keyring [##################################################################] 100%
(1/1) checking package integrity [##################################################################] 100%
(1/1) loading package files [##################################################################] 100%
(1/1) checking for file conflicts [##################################################################] 100%
(1/1) checking available disk space [##################################################################] 100%
:: Processing package changes...
(1/1) upgrading archlinux-keyring [##################################################################] 100%
==> Appending keys from archlinux.gpg...
gpg: public key DB323392796CA067 is 3037 days newer than the signature
==> Locally signing trusted keys in keyring...
==> Importing owner trust values...
==> Disabling revoked keys in keyring...
gpg: checking the trustdb
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: key 786C63F330D7CB92: no user ID for key signature packet of class 10
gpg: public key DB323392796CA067 is 3037 days newer than the signature
gpg: key 1EB2638FF56C0C53: no user ID for key signature packet of class 10
gpg: key 1EB2638FF56C0C53: no user ID for key signature packet of class 10
gpg: marginals needed: 3 completes needed: 1 trust model: pgp
gpg: depth: 0 valid: 1 signed: 25 trust: 0-, 0q, 0n, 0m, 0f, 1u
gpg: depth: 1 valid: 25 signed: 85 trust: 0-, 0q, 0n, 25m, 0f, 0u
gpg: depth: 2 valid: 76 signed: 25 trust: 76-, 0q, 0n, 0m, 0f, 0u
gpg: next trustdb check due at 2021-10-12
-> Disabled 1 keys.
==> Updating trust database...
gpg: next trustdb check due at 2021-10-12
:: Running post-transaction hooks...
(1/2) Arming ConditionNeedsUpdate...
(2/2) pacnew-chaser notify
warning: manjaro-keyring-20210622-1 is up to date -- reinstalling
resolving dependencies...
looking for conflicting packages...
Packages (2) gnupg-2.2.29-1 manjaro-keyring-20210622-1
Total Download Size: 2,49 MiB
Total Installed Size: 10,10 MiB
Net Upgrade Size: 0,00 MiB
:: Proceed with installation? [Y/n]
:: Retrieving packages...
gnupg-2.2.29-1-x86_64 2,4 MiB 1889 KiB/s 00:01 [##################################################################] 100%
manjaro-keyring-20210622-1-any 128,8 KiB 2013 KiB/s 00:00 [##################################################################] 100%
Total (2/2) 2,5 MiB 1753 KiB/s 00:01 [##################################################################] 100%
(2/2) checking keys in keyring [##################################################################] 100%
(2/2) checking package integrity [##################################################################] 100%
error: manjaro-keyring: signature from "Helmut Stult (schinfo) <helmut.stult@schinfo.de>" is unknown trust
:: File /var/cache/pacman/pkg/manjaro-keyring-20210622-1-any.pkg.tar.zst is corrupted (invalid or corrupted package (PGP signature)).
Do you want to delete it? [Y/n] n
error: failed to commit transaction (invalid or corrupted package (PGP signature))
Errors occurred, no packages were upgraded.