81d58d6b24
Signing package feeds will default to ascii armored signatures (ASC) the other option being binary (BIN). This is for both rpm and ipk backends. (From OE-Core rev: 862a3892feb2628282e1d6f2e4498a7a3bd60cbf) Signed-off-by: Ioan-Adrian Ratiu <adrian.ratiu@ni.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
44 lines
1.7 KiB
Text
44 lines
1.7 KiB
Text
# Class for signing package feeds
|
|
#
|
|
# Related configuration variables that will be used after this class is
|
|
# iherited:
|
|
# PACKAGE_FEED_PASSPHRASE_FILE
|
|
# Path to a file containing the passphrase of the signing key.
|
|
# PACKAGE_FEED_GPG_NAME
|
|
# Name of the key to sign with. May be key id or key name.
|
|
# PACKAGE_FEED_GPG_BACKEND
|
|
# Optional variable for specifying the backend to use for signing.
|
|
# Currently the only available option is 'local', i.e. local signing
|
|
# on the build host.
|
|
# PACKAGE_FEED_GPG_SIGNATURE_TYPE
|
|
# Optional variable for specifying the type of gpg signature, can be:
|
|
# 1. Ascii armored (ASC), default if not set
|
|
# 2. Binary (BIN)
|
|
# This variable is only available for IPK feeds. It is ignored on
|
|
# other packaging backends.
|
|
# GPG_BIN
|
|
# Optional variable for specifying the gpg binary/wrapper to use for
|
|
# signing.
|
|
# GPG_PATH
|
|
# Optional variable for specifying the gnupg "home" directory:
|
|
#
|
|
inherit sanity
|
|
|
|
PACKAGE_FEED_SIGN = '1'
|
|
PACKAGE_FEED_GPG_BACKEND ?= 'local'
|
|
PACKAGE_FEED_GPG_SIGNATURE_TYPE ?= 'ASC'
|
|
|
|
python () {
|
|
# Check sanity of configuration
|
|
for var in ('PACKAGE_FEED_GPG_NAME', 'PACKAGE_FEED_GPG_PASSPHRASE_FILE'):
|
|
if not d.getVar(var, True):
|
|
raise_sanity_error("You need to define %s in the config" % var, d)
|
|
|
|
sigtype = d.getVar("PACKAGE_FEED_GPG_SIGNATURE_TYPE", True)
|
|
if sigtype.upper() != "ASC" and sigtype.upper() != "BIN":
|
|
raise_sanity_error("Bad value for PACKAGE_FEED_GPG_SIGNATURE_TYPE (%s), use either ASC or BIN" % sigtype)
|
|
}
|
|
|
|
do_package_index[depends] += "signing-keys:do_deploy"
|
|
do_rootfs[depends] += "signing-keys:do_populate_sysroot"
|