From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6669723628337102848 X-Received: by 2002:a50:b323:: with SMTP id q32mr8080491edd.24.1553509295178; Mon, 25 Mar 2019 03:21:35 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a50:9950:: with SMTP id l16ls1741649edb.3.gmail; Mon, 25 Mar 2019 03:21:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqwdMZWgd7WXL1+Jk3va/H+wZIw/ES5WTYWqX9/NZI49Lx9ZEmrIXXE0Ng6eru4KwWEM1yXq X-Received: by 2002:a50:be06:: with SMTP id a6mr15953820edi.64.1553509294576; Mon, 25 Mar 2019 03:21:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553509294; cv=none; d=google.com; s=arc-20160816; b=lZIPbqtn2OXT+A5oOdW8sTW/BbyWDxrHV7gdQW7mJN8MioMboiiC33ZRAlcNPdWCAI Dd/wgWGCj3yWnXUONnnQ7JyLt91eTN0pcSigsJSoP48ozYICeExTYfzCssgMG8lzJZsn JOBTk47tqFncZ8+LjR9o3tBxQizFN86CKsF7qx58w6OmKj/KYFsQ/YQgpvtorQVB4oFn 94KrqvJsN1DpxaJ2noyBOXraWWMrBRNDvM7jm2fb+R0+pVebRSBy2nkGZndORuSZblHP dMcIJ7v4DRTcURsCG7wIEFl1LPdYFnLv3EKWe29kgnWZJOlAoUm0Osyk/ePur6M/1w6S 6k8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=user-agent:in-reply-to:content-disposition:content-description :mime-version:references:message-id:subject:to:from:date; bh=Nj2jh2W71Jdci93G3CSBLWKwM/FkESkGy9JUNAAZT9Y=; b=f5pN4KiW0l+uvnsOb9GZMUkVZGpovNpoDZ1PwyG6TloqMhSa4y0LWF63z61Xlxc10U ogIV6NSOWGWHe4cgpRFDU2BmGTb7lvs7iNwn9UhVqoW+y07r3Ki62NZvN6UTjpuAVJZT afDkcpvbsl0F124ZTgPHfxXvhEPOoR414Q2OJVVB2t2jjFMJFLg0L2eCJ/5zCijiD/9O bSbAeRClVHTNgkQJ3eVx10aoskj4H4C67l2n9X4lEl/lm3/o9//EyPxGNAv+lWnfesml CkFkc1NaHeB171Njce0HP6VQpEzdWbfqKydxmEvWJMf/Vw+xtWv8xXiphmfYshNWuCPB vFPA== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of andreas.reichel.ext@siemens.com designates 192.35.17.14 as permitted sender) smtp.mailfrom=andreas.reichel.ext@siemens.com Return-Path: Received: from david.siemens.de (david.siemens.de. [192.35.17.14]) by gmr-mx.google.com with ESMTPS id r37si620755edd.2.2019.03.25.03.21.34 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 25 Mar 2019 03:21:34 -0700 (PDT) Received-SPF: pass (google.com: domain of andreas.reichel.ext@siemens.com designates 192.35.17.14 as permitted sender) client-ip=192.35.17.14; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of andreas.reichel.ext@siemens.com designates 192.35.17.14 as permitted sender) smtp.mailfrom=andreas.reichel.ext@siemens.com Received: from mail1.sbs.de (mail1.sbs.de [192.129.41.35]) by david.siemens.de (8.15.2/8.15.2) with ESMTPS id x2PALYnk025884 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Mon, 25 Mar 2019 11:21:34 +0100 Received: from iiotirae (golem.ppmd.siemens.net [139.25.69.17]) by mail1.sbs.de (8.15.2/8.15.2) with SMTP id x2PALXZN029418 for ; Mon, 25 Mar 2019 11:21:33 +0100 Date: Mon, 25 Mar 2019 11:19:40 +0100 From: Andreas Reichel To: isar-users@googlegroups.com Subject: Re: [PATCH v8 0/7] Fix usage of additional apt keys and repos Message-ID: <20190325101939.GA11173@iiotirae> References: <20190321151526.12001-1-andreas.reichel.ext@siemens.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Description: message Content-Disposition: inline In-Reply-To: <20190321151526.12001-1-andreas.reichel.ext@siemens.com> User-Agent: Mutt/1.11.4 (2019-03-13) X-TUID: dufRkSTHbDmV > Not working yet: > qemuarm64-stretch with BASE_REPO_KEY and do_cache_base_repo > > | gpgme gave error GPGME:54: Unusable secret key > > I have created a keypair inside the build container and exported the > public key to a file "blabla.key". Then I set > > BASE_REPO_KEY = "file:///build/blabla.key" > > Any idea? > There was actually no problem anymore. The KEY had to be in the gpg key ring which was expected by the normal user in /tmp/tmpb6et85_1/.gnupg, not /home/builder/.gnupg. After readding the secrect key for the normal build user, it worked. I have just triggered a CI build on ilbers-ci. After that is green, you can apply my patchset. Regards Andreas > Signed-off-by: Andreas Reichel > > Andreas Reichel (7): > Revert "isar-bootstrap: Allow to set local keys in DISTRO_APT_KEYS" > Remove duplicate code from apt-keyring generation > Fix fetched key location in apt-keyring generator > Use apt-key to generate keyrings > If we use a custom keyring debootstrap may fall to https > raspbian-jessie: Use DISTRO_BOOTSTRAP_KEYS > docs: Update user_manual.md > > doc/user_manual.md | 7 +- > meta-isar/conf/distro/raspbian-jessie.conf | 2 +- > .../conf/multiconfig/qemuamd64-buster.conf | 1 - > .../conf/multiconfig/qemuamd64-jessie.conf | 1 - > meta/conf/bitbake.conf | 1 + > .../isar-bootstrap/isar-bootstrap-host.bb | 4 +- > .../isar-bootstrap/isar-bootstrap-target.bb | 4 +- > .../isar-bootstrap/isar-bootstrap.inc | 95 +++++++++++++------ > 8 files changed, 79 insertions(+), 36 deletions(-) > > -- > 2.21.0 > -- Andreas Reichel Dipl.-Phys. (Univ.) Software Consultant Andreas.Reichel@tngtech.com, +49-174-3180074 TNG Technology Consulting GmbH, Betastr. 13a, 85774 Unterfoehring Geschaeftsfuehrer: Henrik Klagges, Dr. Robert Dahlke, Gerhard Mueller Sitz: Unterfoehring * Amtsgericht Muenchen * HRB 135082