Install qubes-pass-dom0 GPG check FAILED

I’m trying to install Rudd-Os Inter-VM Pass password manager for Qubes OS following the README GitHub - Rudd-O/qubes-pass: An inter-VM password manager for Qubes OS

The parts for the management and the service part went smooth witout any problems (in FC40), but the part involving dom0 I didn’t succeed. In the README it says to copy the qubes-pass-dom0-<version>.noarch.rpm file to your dom0, but the execution of qvm-pass init <GPG key ID available in the password store VM> fails with “Request refused”.

I assume it’s necessary to install the rpm in dom0 via dnf install similar to the installation in the manage and service Qubes to adapt the policies, but if I try that it fails with

Warning: Enforcing GPG signature check globally as per active security policy (see ‘gpgcheck’ in dnf.conf(5) for how to squelch this message)

Package qubes-pass-dom0-0.1.0-1.fc40.noarch.rpm is not signed
Error: GPG check FAILED

If i add --nogpgcheck the error is the same.

After this I replaced all the gpgcheck=1 with gpgcheck=0 in the /etc/yum.repos.d/*.repo files and in the /etc/dnf/dnf.conf file, but still getting the same error.

Any idea how to finish the qubes-pass installation?

Thanks a lot in advance!

Did you try to install it using rpm?

sudo rpm -i /path/to/qubes-pass-dom0-0.1.0-1.fc40.noarch.rpm

No, I didn’t and this solved the problem with --nosignature as additional option, so the complete command for applying the policies in Dom0 is sudo rpm --nosignature -i /path/to/qubes-pass-dom0-0.1.0-1.fc40.noarch.rpm. Thank you very much!

@Rudd-O Maybe this could be added to that qubes-pass/README.md at master · Rudd-O/qubes-pass · GitHub file for qubes-pass?