Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adds SDW buster template rpm 0.2.3 #20

Merged
merged 2 commits into from
Jun 10, 2021
Merged

Conversation

conorsch
Copy link
Contributor

@conorsch conorsch commented Jun 10, 2021

Name of package: qubes-template-securedrop-workstation-buster

Promoting to prod the same artifact submitted to yum-test in [0].
This RPM is signed with the new prod key, as part of the key rotation
transition in 2021-06. The new keyid is:

2359E6538C0613E652955E6C188EDD3B7B22E6A3

This is the first artifact on yum.securedrop.org to be signed with this
key.

[0] freedomofpress/securedrop-yum-test#26

Test plan

  • This is the same rpm submitted in the yum-test PR (above). Grab that locally, run rpm --delsign on it and on this one, and you should see the same checksum: c419f39319d78bc034b861af315b503454ae69f8bc09201f6410b63125d46d02
  • CI is passing, the rpm is properly signed with the prod key
  • Visual inspection of changes to the key verification scripts

@conorsch
Copy link
Contributor Author

Marking as draft while I poke at the key-verification tasks in CI...

Conor Schaefer added 2 commits June 9, 2021 17:26
Promoting to prod the same artifact submitted to yum-test in [0].
This RPM is signed with the *new* prod key, as part of the key rotation
transition in 2021-06. The new keyid is:

  2359E6538C0613E652955E6C188EDD3B7B22E6A3

This is the first artifact on yum.securedrop.org to be signed with this
key.

[0] freedomofpress/securedrop-yum-test#26
The CI logic explicitly checks that the prod key was used to sign RPMs
in this repo. We're currently rotating prod signing keys, so I've added
supported for *both* keys to the script.

This change doesn't include strict logic about all newer RPMs being
signed with the newer key, so humans should still verify the correct key
was used, as we get closer to the expiry date. It'll still catch
easy mistakes like if the test key is used, since we frequently promote
the same debs from yum-test to yum prod.
@conorsch conorsch force-pushed the sdw-template-0.2.3 branch from d5c9f3c to e445fe1 Compare June 10, 2021 00:32
@conorsch conorsch marked this pull request as ready for review June 10, 2021 00:37
@conorsch conorsch requested a review from sssoleileraaa June 10, 2021 00:37
@conorsch
Copy link
Contributor Author

All set, marking ready for review.

Copy link
Contributor

@sssoleileraaa sssoleileraaa left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  • This is the same rpm submitted in the yum-test PR (above). Grab that locally, run rpm --delsign on it and on this one, and you should see the same checksum: c419f39319d78bc034b861af315b503454ae69f8bc09201f6410b63125d46d02
  • CI is passing, the rpm is properly signed with the prod key
  • Visual inspection of changes to the key verification scripts

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants