-
Notifications
You must be signed in to change notification settings - Fork 129
RPM sign #179
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
+1 I'm having trouble getting this to work also. |
+1 I'm trying to sign Debian packages with no luck. (I'm using Gradle 3.0 on Windows) Based on the plug-in's documentation and unit test code, I have the following in my plugins {
id 'nebula.ospackage' version '4.0.0'
}
ospackage {
packageName = 'mypackage'
version = '1.2.3'
....
signingKeyId = '12345678'
signingKeyPassphrase = 'mypassphrase'
signingKeyRingFile = new File(System.properties['user.home'] + '/secring.gpg')
} # A production Debian created with dpkg-deb and signed with dpkg-sig
$ dpkg-sig --list mypackage_1.2.3_all.deb
Processing mypackage_1.2.3_all.deb
builder
$ ar x mypackage_1.2.3.all.deb && ls *gpg*
_gpgbuilder
# Debian created with nebula.ospackage
$ dpkg-sig --list mypackage_1.2.3_all.deb
Processing mypackage_1.2.3_all.deb
$ ar x mypackage_1.2.3.all.deb && ls *gpg* I'm using the same I also provided invalid values for I also don't see the signature file from the Scanner class referenced in the DebPluginTest unit test. |
+1 I have the same need. |
Here's a walkthrough of the signing feature for RPMs and Debs. RPMI set up an example for this with the latest centos docker image. KeysI'm generating one just for this example.
We want the long form:
Public key has to be imported into rpm to verify:
Build RPMplugins {
id 'java'
id 'nebula.ospackage' version '4.3.0'
}
ospackage {
version '1.0.0'
release '1'
from(jar.outputs.files) {
into '/lib'
}
signingKeyId = 'E12BECFCDEA5D717' // note: short key works here too
signingKeyPassphrase = System.getenv('SIGNING_PASSPHRASE')
signingKeyRingFile = new File(System.properties['user.home'] + '/.gnupg/secring.gpg') // this is the default value, only include if reading from a different key ring
}
Verify RPMnote the
And the OK result from
RPM Notes
DebVerified with the latest Ubuntu docker image. Keys for Deb
I followed this blog post for the importing and policy creation below.
Create the policy document, see the blog post mentioned or Build Debplugins {
id 'java'
id 'nebula.ospackage' version '4.3.0'
}
ospackage {
version '1.0.0'
release '1'
from(jar.outputs.files) {
into '/lib'
}
signingKeyId = '64D9E5F5' // note: long key id does not work here
signingKeyPassphrase = System.getenv('SIGNING_PASSPHRASE')
signingKeyRingFile = new File(System.properties['user.home'] + '/.gnupg/secring.gpg')
}
Verify Deb
Deb Notes
|
Hi, can you provide a complete example of how to sign RPM using:
signingKeyId
signingKeyPassphrase
signingKeyRingFile
I've tried to use the Key ID or what I think the ID is or pointing to the Key Ring File. None of that worked even though my build suceeds. That means I cannot track where the problem is, signature field is just empty when I check RPM.
The text was updated successfully, but these errors were encountered: