Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Explicitly manage our additions to the rpm keyring instead of appending #423

Open
emkll opened this issue Jan 23, 2020 · 2 comments
Open

Comments

@emkll
Copy link
Contributor

emkll commented Jan 23, 2020

In https://github.com/freedomofpress/securedrop-workstation/blob/master/sys-firewall/sd-copy-rpm-repo-pubkey.sh#L10 , we rpm --import the key. While this works as expected, we need to ensure the keys that are present are only the ones that we want (in prod, remove or ensure the dev key is removed)

related to #406

@rocodes
Copy link
Contributor

rocodes commented May 7, 2024

We may change approaches here slightly if we publish a keyring + repo bootstrapping package, but even if we do that, keys should be manually added and removed from the rpm dom0 database (see #953) - see eg steps at https://gist.github.com/rocodes/41a8dee0c9098445ea3629770c29c690

@rocodes
Copy link
Contributor

rocodes commented May 8, 2024

Per conversation yesterday, the keyring will be in its own repo, so removing "good first issue" for now - I have a preliminary .spec file for the new repo that I can push and I'll include example key management logic in the %post section.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: No status
Development

No branches or pull requests

3 participants