Project

Profile

Help

Story #4812

closed

As a user, I can publish a Yum repository that works with repo_gpgcheck=1 (Signed Repositories)

Added by dalley over 5 years ago. Updated over 4 years ago.

Status:
CLOSED - CURRENTRELEASE
Priority:
High
Assignee:
Sprint/Milestone:
Start date:
Due date:
% Done:

100%

Estimated time:
Platform Release:
Groomed:
No
Sprint Candidate:
No
Tags:
Sprint:
Quarter:

Description

(Clone of Pulp 2 issue https://pulp.plan.io/issues/3055)

To allow a Yum repository to be used with Yum clients that have repo_gpgcheck=1 configured in /etc/yum.conf:

  1. Create a new GPG signing key that can be used by Pulp worker processes without a password. (Documentation provides example procedures.)
  2. Append the public key associated with the new GPG signing key to the gpgkey file specified in the distributor config for the Yum repository in Pulp.
  3. Set gpg_sign_metadata to True in the distributor config for the Yum repository in Pulp.

See also https://access.redhat.com/solutions/2850911

More detailed description from Neal Gompa (Conan_Kudo, Fedora contributor):

Signed repositories (for RPM repos) are when the `repomd.xml` file (the index file referencing all other parts of the RPM metadata) is signed using a GPG key (but does not necessarily have to be the same key as the packages, though usually is) in the form of a detached signature (`repomd.xml.asc`) that is placed next to the `repomd.xml` file. Package managers like DNF, Zypper, and YUM can use this when `repo_gpgcheck=1` is set in the .repo file to validate the XML before reading it. SUSE systems require this by default and will not normally fetch repos that are not signed. If the GPG key for the repository metadata differs from the packages' GPG key, its public key must also be present in the `gpgkey=` list in the .repo file.


Related issues

Related to Pulp - Story #7247: As a pulp_installer developer-user, the pulp_rpm signing service will be installed for meNEWmdepaulo@redhat.com

Actions

Also available in: Atom PDF