-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
rpm --import
does not update our release pubkey
#953
Comments
Commenting that in the upstream ticket above, there's been some progress towards resolving this issue, so the combination of that plus our longer release key expiry (#1046) means hopefully we won't encounter this again in SDW, although we should keep it open until we're sure. (A 4.1 workaround has been linked above) |
Don't want to close this til it's fully resolved upstream, but the current status is: fixed in 4.1 (workaround); not relevant for our release signing key for 3 more years in 4.2 (longer signing key expiry). |
Summary
dom0 updates recently started failing for longstanding SDW installs, with the behaviour that the SDW updater and GUI updater would fail, and on inspection of the updatevm console, the following message appeared:
This is caused by this issue in RPM, where a key different subkeys but the same master key fingerprint (our use case) is not replaced in the rpm database when
rpm --import
is run. When we bumped our release key last summer, the updated key was put in place at/etc/pki/rpm-gpg/RPM-GPG-KEY-securedrop-workstation
, but the rpm import command meant it wasn't imported into the rpm pubkey database. (Visible by querying pubkeys viarpm -qi
and comparing).Why now?
Hard to say why this didn't bite us sooner, but my best guess is that this upstream commit changed the behaviour of which rpm db material was 'winning' and being used in the updatevm. It came a few weeks after our key bump, so this would be the first time we would have released a new dom0 rpm since then.
Manual resolution
The good news is, the appropriate key is already on users' machines in dom0, in
/etc/pki/rpm-gpg
.Next steps
rpm --import
will handle it for us, write tests against the pubkey in the rpm database (/var/lib/rpm
on dom0) as well as the key in/etc/pki/rpm-gpg/
. We can use this ticket to discuss what steps we want to take on the provisioning side.The text was updated successfully, but these errors were encountered: