From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6880878174534631424 X-Received: by 2002:a92:360a:: with SMTP id d10mr33027847ila.198.1607929396914; Sun, 13 Dec 2020 23:03:16 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a6b:fb06:: with SMTP id h6ls2238788iog.9.gmail; Sun, 13 Dec 2020 23:03:16 -0800 (PST) X-Google-Smtp-Source: ABdhPJzMSHkHrVZPEar7EcL3kU8U7cUKrVh+LIBZOmGt4BEHjoiQpa521kE2SCUG2ovaJ5Vk704S X-Received: by 2002:a6b:7717:: with SMTP id n23mr30974905iom.73.1607929396412; Sun, 13 Dec 2020 23:03:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607929396; cv=none; d=google.com; s=arc-20160816; b=sbvqz8JD59TYmqgvI4p8b365K7fS5YmqiJObOeU+uXsxq2NYrz8XAZz4l0bm2H2/6u +geutkoenqrR9/z3SYkUfFz/ExLhyv8vyQm/jxYsljavw0znPW0mo8smdo5Vm1jKK25V Ze+JZA9JQXJSQbWbgSS+mCysKrL0Yxf8VwpriVloCfsFneYupteqj4M/PtBvqmdSGZk0 CBUlQFq/7YcOOtSNsnlqGysTcJ2voBxPvB32lUr7a92CsqnvBueSc/hY1940nl7DWoPw DF+Wgh+JYbcK43x6g/5D+kIatQjj7fa7/xM+33uRASRbp0+88kOcV8N+ynx8OI+rk4Z1 0htA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:content-language:in-reply-to:mime-version :user-agent:date:message-id:references:to:from:subject; bh=QToub2UcIbiOuCNWuIb5xqBKnSzsm5KMXysGnjxoWzI=; b=fb7eSi0BXAJjNwJnynXqh0R8YVBsVuE3cqTbUDjQyqCvsirZqJ1TRJ+OHE9GeBSmSj qSXMceNsLOWdMpW6cZg3ATRywnlXUeOfnf03YltlBvlHh585e9k8n4/EiQXadJDAhsFr Q1ezKh7j1rNvY/WWmx8gxZhcXEVzWoygf911wlrleqGlJjT/qjBBvYJlRYwJ7xsfDfo2 +jcsf6YD5r0eGYv0FJ1LnQkXau9hRCLRVWh0RRn8dycEhXo5BxHge7Mtpkt42LhR5qOb zXMsfcgWt6Efx2Q3k+mVXNw7i0L272MuCW5bnH70pCUuZ09GDPsBoTgNIqP2GulIjLEd 3QVg== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 194.138.37.39 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from lizzard.sbs.de (lizzard.sbs.de. [194.138.37.39]) by gmr-mx.google.com with ESMTPS id q4si1154153iog.3.2020.12.13.23.03.15 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sun, 13 Dec 2020 23:03:16 -0800 (PST) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 194.138.37.39 as permitted sender) client-ip=194.138.37.39; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 194.138.37.39 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail2.sbs.de (mail2.sbs.de [192.129.41.66]) by lizzard.sbs.de (8.15.2/8.15.2) with ESMTPS id 0BE73EpC006493 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 14 Dec 2020 08:03:14 +0100 Received: from [167.87.38.225] ([167.87.38.225]) by mail2.sbs.de (8.15.2/8.15.2) with ESMTP id 0BE73EoN023430; Mon, 14 Dec 2020 08:03:14 +0100 Subject: Re: [PATCH v4 07/13] isar-bootstrap: Connect to gpg-agent before adding keys From: Jan Kiszka To: isar-users , Baurzhan Ismagulov References: <72ce3a90-0772-c8a4-f233-1b887c636a9d@siemens.com> Message-ID: <84c44f3f-9705-a1a4-4ab2-acec2ada8c95@siemens.com> Date: Mon, 14 Dec 2020 08:03:14 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.5.0 MIME-Version: 1.0 In-Reply-To: <72ce3a90-0772-c8a4-f233-1b887c636a9d@siemens.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-TUID: vr/Js9yt3QR5 On 21.11.20 08:41, [ext] Jan Kiszka wrote: > On 07.10.20 16:01, [ext] Jan Kiszka wrote: >> From: Jan Kiszka >> >> We have recurring issues in CI with the gpg-agent not being ready when >> trying to use apt-key: >> >> gpg: can't connect to the agent: IPC connect call failed >> >> Work around this by connecting upfront to the agent, retrying that in a >> bounded loop. >> >> Signed-off-by: Jan Kiszka >> --- >> meta/recipes-core/isar-bootstrap/isar-bootstrap.inc | 9 ++++++--- >> 1 file changed, 6 insertions(+), 3 deletions(-) >> >> diff --git a/meta/recipes-core/isar-bootstrap/isar-bootstrap.inc b/meta/recipes-core/isar-bootstrap/isar-bootstrap.inc >> index fbfe669d..1c5dba74 100644 >> --- a/meta/recipes-core/isar-bootstrap/isar-bootstrap.inc >> +++ b/meta/recipes-core/isar-bootstrap/isar-bootstrap.inc >> @@ -303,10 +303,13 @@ isar_bootstrap() { >> "${ROOTFSDIR}/etc/apt/apt.conf.d/50isar.conf" >> find ${APT_KEYS_DIR}/ -type f | while read keyfile >> do >> - kfn="$(basename $keyfile)" >> + export kfn="$(basename $keyfile)" >> cp $keyfile "${ROOTFSDIR}/tmp/$kfn" >> - chroot "${ROOTFSDIR}" /usr/bin/apt-key \ >> - --keyring ${THIRD_PARTY_APT_KEYRING} add "/tmp/$kfn" >> + chroot "${ROOTFSDIR}" sh -c ' >> + for i in $(seq 10); do >> + /usr/bin/apt-key --keyring ${THIRD_PARTY_APT_KEYRING} add "/tmp/$kfn" && break >> + sleep 1 >> + done' >> rm "${ROOTFSDIR}/tmp/$kfn" >> done >> >> > > No more gpg-related CI failures since this has been applied to our > layers. You said you have an even better version, but that wasn't even > shared so far. > Yet another ping on this. Jan -- Siemens AG, T RDA IOT Corporate Competence Center Embedded Linux