From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6880878174534631424 X-Received: by 2002:a5d:6050:: with SMTP id j16mr21691720wrt.158.1605944519773; Fri, 20 Nov 2020 23:41:59 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a7b:c354:: with SMTP id l20ls515588wmj.0.canary-gmail; Fri, 20 Nov 2020 23:41:58 -0800 (PST) X-Google-Smtp-Source: ABdhPJw2AdxuAPd+zvqMpoJbobh3hU4j2OmX9cwCX9Q6/4antO26sdjMQFxwUZo9ZoWbW+M6nySA X-Received: by 2002:a7b:c255:: with SMTP id b21mr14101598wmj.72.1605944518724; Fri, 20 Nov 2020 23:41:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605944518; cv=none; d=google.com; s=arc-20160816; b=tr1OTyRyBJ/bX4dSdVop/w4QErdYFoaK1WTOAMmj737OjsFsStKDlFhLcMUKVxjGOL RbMn304KDJmhq6TgxMr/ICqcWmQQug/aKE0Ua5aWVYFeD9/PvbDIwDG22a3v6BHggu5m Eu6oGlGMnDOmHbyJyPTIqjDaGprtU3GH1u+p3UFkXPko4YtL2bVQvjBOEuyZw5Lu28cL 2TGejPw9cLlBH9FUy3AKn4mqXPsVtfQQ8v3tAYeBWjxSGAoMvLvxwe2SfSorKhwmtQ7L n2O7Kt8ONZ7kRJPh9hGRfbHLSTLiC8XE/iJ7MlPCGYakAgJ6i/dYdg2t4PF6Mm2DSTBx ZlBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:content-language:in-reply-to:mime-version :user-agent:date:message-id:references:to:from:subject; bh=qeuGyT3SmGhEIatKIr/4OIhyMEajlkrlFd3IBw5OU+I=; b=frgp/IM+uUU6yNVNjt5IhcXC0rXBz8soqZQ1Ihu5NUrctD/vqSfn5BAnWm2b5KLrGb wSybb6Lyvyw/kknmyvCrAKodu+0UYPCZ3azZGAHz27woVhOM4+twGZjIOivjEn/1JlLz lI6RQLyZOWec3w5aCg2il9E3xTkEjgsJ7d4tfYVOWIaphPhqNJBxnIVUKtMGy06XZuyT DSuF6yM94CDlAPkDF3H7sAUpN/FoysRbLuYV7zBKSd9hby05D/kxbhP57a1uwxl2Qz0w qz7JNU1w6xuBVDf61F1hqoe3DKKhZ7Ujthve8V123UqbUNSgR9UONFdNtEUDy7hkM4fF XOWg== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.14 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from david.siemens.de (david.siemens.de. [192.35.17.14]) by gmr-mx.google.com with ESMTPS id c20si368929wmd.2.2020.11.20.23.41.58 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 20 Nov 2020 23:41:58 -0800 (PST) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.14 as permitted sender) client-ip=192.35.17.14; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.14 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail2.sbs.de (mail2.sbs.de [192.129.41.66]) by david.siemens.de (8.15.2/8.15.2) with ESMTPS id 0AL7fwHW003721 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sat, 21 Nov 2020 08:41:58 +0100 Received: from [167.87.38.29] ([167.87.38.29]) by mail2.sbs.de (8.15.2/8.15.2) with ESMTP id 0AL7fvJM017169; Sat, 21 Nov 2020 08:41:57 +0100 Subject: Re: [PATCH v4 07/13] isar-bootstrap: Connect to gpg-agent before adding keys From: Jan Kiszka To: isar-users , Baurzhan Ismagulov References: Message-ID: <72ce3a90-0772-c8a4-f233-1b887c636a9d@siemens.com> Date: Sat, 21 Nov 2020 08:41:57 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.4.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-TUID: /tJTxawpB4bB On 07.10.20 16:01, [ext] Jan Kiszka wrote: > From: Jan Kiszka > > We have recurring issues in CI with the gpg-agent not being ready when > trying to use apt-key: > > gpg: can't connect to the agent: IPC connect call failed > > Work around this by connecting upfront to the agent, retrying that in a > bounded loop. > > Signed-off-by: Jan Kiszka > --- > meta/recipes-core/isar-bootstrap/isar-bootstrap.inc | 9 ++++++--- > 1 file changed, 6 insertions(+), 3 deletions(-) > > diff --git a/meta/recipes-core/isar-bootstrap/isar-bootstrap.inc b/meta/recipes-core/isar-bootstrap/isar-bootstrap.inc > index fbfe669d..1c5dba74 100644 > --- a/meta/recipes-core/isar-bootstrap/isar-bootstrap.inc > +++ b/meta/recipes-core/isar-bootstrap/isar-bootstrap.inc > @@ -303,10 +303,13 @@ isar_bootstrap() { > "${ROOTFSDIR}/etc/apt/apt.conf.d/50isar.conf" > find ${APT_KEYS_DIR}/ -type f | while read keyfile > do > - kfn="$(basename $keyfile)" > + export kfn="$(basename $keyfile)" > cp $keyfile "${ROOTFSDIR}/tmp/$kfn" > - chroot "${ROOTFSDIR}" /usr/bin/apt-key \ > - --keyring ${THIRD_PARTY_APT_KEYRING} add "/tmp/$kfn" > + chroot "${ROOTFSDIR}" sh -c ' > + for i in $(seq 10); do > + /usr/bin/apt-key --keyring ${THIRD_PARTY_APT_KEYRING} add "/tmp/$kfn" && break > + sleep 1 > + done' > rm "${ROOTFSDIR}/tmp/$kfn" > done > > No more gpg-related CI failures since this has been applied to our layers. You said you have an even better version, but that wasn't even shared so far. Jan -- Siemens AG, T RDA IOT Corporate Competence Center Embedded Linux