From 5377d5df7eacbc62881f18d6820db63f9b478a38 Mon Sep 17 00:00:00 2001 From: Fabian Arrotin Date: Jun 22 2021 10:37:50 +0000 Subject: Added SIG GPG creation doc Signed-off-by: Fabian Arrotin --- diff --git a/docs/buildsys/koji-cbs-sigs.md b/docs/buildsys/koji-cbs-sigs.md index dab017c..b354985 100644 --- a/docs/buildsys/koji-cbs-sigs.md +++ b/docs/buildsys/koji-cbs-sigs.md @@ -91,6 +91,66 @@ Kind Regards, Each SIG building RPM packages through https://cbs.centos.org community build service will need a GPG security key that will be then automatically be used by the signing service +!!! danger + Due to sensitive information ,the following steps are restricted to a very limited number of people and on a restrictive node that doesn't have *any* direct inbound connection. Worth knowing that such node isn't reachable directly by the central ansible automation system, so ansible automation has to be ran "on demand" by people taking following actions. + +We first need to create a new GPG key on the signing machine , protected with a strong passphrase, that will be needed to unlock signing service/agent. + +To generate a strong passphrase you can for example use `openssl rand -base64 30` (or any other strong/long passphrase generator) + +Let's use the `sig-kmods` SIG as an example for the next steps (and of course adapt on each operation, manual step) +We first need to ssh as the signing user (important for TTY) on the signing service machine. Then we can proceed like this : + +``` +# Let's define some variables first +sig_name="CentOS Kmods SIG" +sig_url="https://wiki.centos.org/SpecialInterestGroup/Kmods" +sig_key_passphrase="Of_Course_A_Real_Passphrase_generated_as_described_above" +# Creating the key in keyring +gpg --batch --gen-key < /var/tmp/RPM-GPG-KEY-CentOS-SIG-$(echo ${sig_name/CentOS/}|sed 's/SIG//') +gpg --with-fingerprint /var/tmp/RPM-GPG-KEY-CentOS-SIG-$(echo ${sig_name/CentOS/}|sed 's/SIG//') + +pub 2048R/7AE06D54 2021-06-22 CentOS Kmods SIG (https://wiki.centos.org/SpecialInterestGroup/Kmods) + Key fingerprint = 48EF 712E C5DD B68B 5280 BE45 5B8E 1A76 7AE0 6D54 +sub 2048R/E46DCBCB 2021-06-22 + +``` + +Now either submit a PR or directly do a git commit/push to [CentOS.org git repository](https://git.centos.org/centos/centos.org) and key will be available on website automatically after. +Simply drop the `RPM-GPG-KEY-CentOS-SIG-` under /keys/ directory and update /keys.md to add the link to download the key and show fingerprint + +Here is the Kmods SIG [commit](https://git.centos.org/centos/centos.org/c/fc51c0fc590ebdc734906343ccc392298fda930d?branch=master) given a reference + +!!! warning + Don't forget to also put the gpg passphrase in the git-crypted pkistore as it will be needed each time that we'll have to unlock the gpg keys in keyring (like on a reboot of the signing machine/service) ## Koji tags creation