diff options
author | Markus Lehtonen <markus.lehtonen@linux.intel.com> | 2015-08-21 17:21:57 +0300 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2015-09-03 12:43:19 +0100 |
commit | 752736ae9f9c8842018e45cff2f5b1d770557d86 (patch) | |
tree | 0a95ef3491ff7c85747405ad9b831100dc2a9443 /meta/classes/sign_rpm.bbclass | |
parent | 103f0e5828d352b44681abe7fe47b606e6ad134b (diff) | |
download | poky-752736ae9f9c8842018e45cff2f5b1d770557d86.tar.gz |
package_rpm: support signing of rpm packages
This patch adds a new bbclass for generating rpm packages that are
signed with a user defined key. The packages are signed as part of the
"package_write_rpm" task.
In order to enable the feature you need to
1. 'INHERIT += " sign_rpm"' in bitbake config (e.g. local or
distro)
2. Create a file that contains the passphrase to your gpg secret key
3. 'RPM_GPG_PASSPHRASE_FILE = "<path_to_file>" in bitbake config,
pointing to the passphrase file created in 2.
4. Define GPG key name to use by either defining
'RPM_GPG_NAME = "<key_id>" in bitbake config OR by defining
%_gpg_name <key_id> in your ~/.oerpmmacros file
5. 'RPM_GPG_PUBKEY = "<path_to_pubkey>" in bitbake config pointing to
the public key (in "armor" format)
The user may optionally define "GPG_BIN" variable in the bitbake
configuration in order to specify a specific gpg binary/wrapper to use.
The sign_rpm.bbclass implements a simple scenario of locally signing the
packages. It could be replaced by a more advanced class that would
utilize a separate signing server for signing the packages, for example.
[YOCTO #8134]
(From OE-Core rev: 75f5f11b19ba1bf8743caf9ee7c99a3c67f4b266)
Signed-off-by: Markus Lehtonen <markus.lehtonen@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/classes/sign_rpm.bbclass')
-rw-r--r-- | meta/classes/sign_rpm.bbclass | 75 |
1 files changed, 75 insertions, 0 deletions
diff --git a/meta/classes/sign_rpm.bbclass b/meta/classes/sign_rpm.bbclass new file mode 100644 index 0000000000..0aa4cd841c --- /dev/null +++ b/meta/classes/sign_rpm.bbclass | |||
@@ -0,0 +1,75 @@ | |||
1 | # Class for generating signed RPM packages. | ||
2 | # | ||
3 | # Configuration variables used by this class: | ||
4 | # RPM_GPG_PASSPHRASE_FILE | ||
5 | # Path to a file containing the passphrase of the signing key. | ||
6 | # RPM_GPG_NAME | ||
7 | # Name of the key to sign with. Alternatively you can define | ||
8 | # %_gpg_name macro in your ~/.oerpmmacros file. | ||
9 | # RPM_GPG_PUBKEY | ||
10 | # Path to a file containing the public key (in "armor" format) | ||
11 | # corresponding the signing key. | ||
12 | # GPG_BIN | ||
13 | # Optional variable for specifying the gpg binary/wrapper to use for | ||
14 | # signing. | ||
15 | # | ||
16 | inherit sanity | ||
17 | |||
18 | RPM_SIGN_PACKAGES='1' | ||
19 | |||
20 | |||
21 | _check_gpg_name () { | ||
22 | macrodef=`rpm -E '%_gpg_name'` | ||
23 | [ "$macrodef" == "%_gpg_name" ] && return 1 || return 0 | ||
24 | } | ||
25 | |||
26 | |||
27 | def rpmsign_wrapper(d, files, passphrase, gpg_name=None): | ||
28 | import pexpect | ||
29 | |||
30 | # Find the correct rpm binary | ||
31 | rpm_bin_path = d.getVar('STAGING_BINDIR_NATIVE', True) + '/rpm' | ||
32 | cmd = rpm_bin_path + " --addsign " | ||
33 | if gpg_name: | ||
34 | cmd += "--define '%%_gpg_name %s' " % gpg_name | ||
35 | else: | ||
36 | try: | ||
37 | bb.build.exec_func('_check_gpg_name', d) | ||
38 | except bb.build.FuncFailed: | ||
39 | raise_sanity_error("You need to define RPM_GPG_NAME in bitbake " | ||
40 | "config or the %_gpg_name RPM macro defined " | ||
41 | "(e.g. in ~/.oerpmmacros", d) | ||
42 | if d.getVar('GPG_BIN', True): | ||
43 | cmd += "--define '%%__gpg %s' " % d.getVar('GPG_BIN', True) | ||
44 | cmd += ' '.join(files) | ||
45 | |||
46 | # Need to use pexpect for feeding the passphrase | ||
47 | proc = pexpect.spawn(cmd) | ||
48 | try: | ||
49 | proc.expect_exact('Enter pass phrase:', timeout=15) | ||
50 | proc.sendline(passphrase) | ||
51 | proc.expect(pexpect.EOF, timeout=900) | ||
52 | proc.close() | ||
53 | except pexpect.TIMEOUT as err: | ||
54 | bb.debug('rpmsign timeout: %s' % err) | ||
55 | proc.terminate() | ||
56 | return proc.exitstatus | ||
57 | |||
58 | |||
59 | python sign_rpm () { | ||
60 | import glob | ||
61 | |||
62 | rpm_gpg_pass_file = (d.getVar("RPM_GPG_PASSPHRASE_FILE", True) or "") | ||
63 | if rpm_gpg_pass_file: | ||
64 | with open(rpm_gpg_pass_file) as fobj: | ||
65 | rpm_gpg_passphrase = fobj.readlines()[0].rstrip('\n') | ||
66 | else: | ||
67 | raise_sanity_error("You need to define RPM_GPG_PASSPHRASE_FILE in the config", d) | ||
68 | |||
69 | rpm_gpg_name = (d.getVar("RPM_GPG_NAME", True) or "") | ||
70 | |||
71 | rpms = glob.glob(d.getVar('RPM_PKGWRITEDIR', True) + '/*') | ||
72 | |||
73 | if rpmsign_wrapper(d, rpms, rpm_gpg_passphrase, rpm_gpg_name) != 0: | ||
74 | raise bb.build.FuncFailed("RPM signing failed") | ||
75 | } | ||