1. Trust GPG Keys on Clients
Operating systems either trust their own GPG keys directly or at least ship them installed with the minimal system. But third party packages signed by a different GPG key need manual handling. The clients can be successfully bootstrapped without the GPG key being trusted. However, you cannot install new client tool packages or update them until the keys are trusted.
Clients now use GPG key information entered for a software channel to manage the trusted keys. When a software channel with GPG key information is assigned to a client, the key is trusted when the channel is refreshed or the first package is installed from this channel.
The GPG key URL parameter in the software channel page can contain multiple key URLs separated by "whitespace". In case it is a file URL, the GPG key file must be deployed on the client before the software channel is used.
The GPG keys for the Client Tools Channels of Red Hat based clients are deployed on the client into /etc/pki/rpm-gpg/
and can be referenced with file URLs.
Same is the case with the GPG keys of SUSE Liberty Linux clients.
Only in case a software channel is assigned to the client they will be imported and trusted by the system.
Because Debian based systems sign only metadata, there is no need to specify extra keys for single channels. If a user configures an own GPG key to sign the metadata as described in "Use Your Own GPG Key" in Signing Repository Metadata the deployment and trust of that key is executed automatically. |
1.1. User defined GPG keys
Users can define custom GPG keys to be deployed to a client.
By providing some pillar data and providing the GPG key files in the Salt filesystem, they are automatically deployed to the client.
These keys are deployed into /etc/pki/rpm-gpg/
on RPM based operating systems and to /usr/share/keyrings/
on Debian systems:
Define the pillar key [literalcustom_gpgkeys
for the client you want to deploy the key to and list the names of the key file.
cat /srv/pillar/mypillar.sls custom_gpgkeys: - my_first_gpg.key - my_second_gpgkey.gpg
Additionally in the Salt filesystem create a directory named gpg
and store there the GPG key files with the name specified in the custom_gpgkeys
pillar data.
ls -la /srv/salt/gpg/ /srv/salt/gpg/my_first_gpg.key /srv/salt/gpg/my_second_gpgkey.gpg
The keys are deployed to the client at /etc/pki/rpm-gpg/my_first_gpg.key
and /etc/pki/rpm-gpg/my_second_gpgkey.gpg
.
The last step is to add the URL to the GPG key URL field of the software channel.
Navigate to GPG key URL
the value file:///etc/pki/rpm-gpg/my_first_gpg.key
.
1.2. GPG Keys in Bootstrap Scripts
-
On the SUSE Manager Server, at the command prompt, check the contents of the
/srv/www/htdocs/pub/
directory. This directory contains all available public keys. Take a note of the key that applies to the channel assigned to the client you are registering. -
Open the relevant bootstrap script, locate the
ORG_GPG_KEY=
parameter and add the required key. For example:uyuni-gpg-pubkey-0d20833e.key
You do not need to delete any previously stored keys.
Trusting a GPG key is important for security on clients. It is the task of the administrator to decide which keys are needed and can be trusted. A software channel cannot be assigned to a client when the GPG key is not trusted. |