From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6880878174534631424 X-Received: by 2002:a19:e342:: with SMTP id c2mr1081988lfk.519.1602079297008; Wed, 07 Oct 2020 07:01:37 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a19:554:: with SMTP id 81ls1334921lff.1.gmail; Wed, 07 Oct 2020 07:01:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx/RDZdu3k+TmlL2J56Ux6xMPZwmrqDlbb62JXwJHU5cjCBou5sudYAkrkIplRkkmsP2Zm6 X-Received: by 2002:ac2:485c:: with SMTP id 28mr1123057lfy.584.1602079293836; Wed, 07 Oct 2020 07:01:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602079293; cv=none; d=google.com; s=arc-20160816; b=WxOp2rzEOHr7lWo7K09VcchbCgC9TFi+z2RIzN5B0Ih+TZbZMPSxuxzKHT/8mDjLE9 mOWW2UbthUFJaVuS/pnul/v3YT9QT5dEQmi9qosd55xe4DS3UECbBi1YkCtK9yzHv9Bh E9v08Jab8AmtCPw5w2Re65/1NEgT/KJeZMr+KQdfnwwGhRuQJdEXr9zHoukK5mZC6Y6S bAKJ5c4l4RQuA6/Ah2E03GdUcWrC3TlcLWc3bzPikRK/2MdwdOk7Mz9CEa4Ma57qgat9 82vgITESc9oxNuDUOpAQUL4D4KzS+6y+1YsPfVsknjIOmLPXzUrDIFYhIs4WVt/F28Ds +exA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from; bh=jEtQqetIuPfJscR4fCzCoM9QLJPWeCMZTIojcQ6dOdk=; b=n2cdYJP6c/gXTe3UZUPbsUHIo8AAtnEWxFtnt7A6HLLEQLKHAvOxZiERHTdOZSB+Nj h2MaYk4/NC+wlXK6TG7W12p5NcQD7h79PHQTu+qV+vaTOu0GoXf5V0yZRPUj6etQPaYf jlqXVVH9ZGGc4j2wLVi0sBVj3znVhY8nhtcInRTjLfcdWvNoAJBkieaCxKeHEuRJo3fn 0nXwQCFcKsjtLtCWhh8bmXbCVnujZKY2r/632ztqdtlze8YfBgt9p1XatQEAT88COQPs uhYHGr3327LaMJNfP78c72TPktypJwDto2BjdRtaT4nramggdKE3BaWKZbXNbtHyqmlF Sm4g== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.2 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from thoth.sbs.de (thoth.sbs.de. [192.35.17.2]) by gmr-mx.google.com with ESMTPS id n5si66389lji.5.2020.10.07.07.01.33 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 07 Oct 2020 07:01:33 -0700 (PDT) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.2 as permitted sender) client-ip=192.35.17.2; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.2 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail2.sbs.de (mail2.sbs.de [192.129.41.66]) by thoth.sbs.de (8.15.2/8.15.2) with ESMTPS id 097E1XYY017947 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Wed, 7 Oct 2020 16:01:33 +0200 Received: from md1f2u6c.ad001.siemens.net ([139.22.113.50]) by mail2.sbs.de (8.15.2/8.15.2) with ESMTP id 097E1UkA019880 for ; Wed, 7 Oct 2020 16:01:32 +0200 From: Jan Kiszka To: isar-users Subject: [PATCH v4 07/13] isar-bootstrap: Connect to gpg-agent before adding keys Date: Wed, 7 Oct 2020 16:01:24 +0200 Message-Id: X-Mailer: git-send-email 2.26.2 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-TUID: J53ph87jJdXg From: Jan Kiszka We have recurring issues in CI with the gpg-agent not being ready when trying to use apt-key: gpg: can't connect to the agent: IPC connect call failed Work around this by connecting upfront to the agent, retrying that in a bounded loop. Signed-off-by: Jan Kiszka --- meta/recipes-core/isar-bootstrap/isar-bootstrap.inc | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/meta/recipes-core/isar-bootstrap/isar-bootstrap.inc b/meta/recipes-core/isar-bootstrap/isar-bootstrap.inc index fbfe669d..1c5dba74 100644 --- a/meta/recipes-core/isar-bootstrap/isar-bootstrap.inc +++ b/meta/recipes-core/isar-bootstrap/isar-bootstrap.inc @@ -303,10 +303,13 @@ isar_bootstrap() { "${ROOTFSDIR}/etc/apt/apt.conf.d/50isar.conf" find ${APT_KEYS_DIR}/ -type f | while read keyfile do - kfn="$(basename $keyfile)" + export kfn="$(basename $keyfile)" cp $keyfile "${ROOTFSDIR}/tmp/$kfn" - chroot "${ROOTFSDIR}" /usr/bin/apt-key \ - --keyring ${THIRD_PARTY_APT_KEYRING} add "/tmp/$kfn" + chroot "${ROOTFSDIR}" sh -c ' + for i in $(seq 10); do + /usr/bin/apt-key --keyring ${THIRD_PARTY_APT_KEYRING} add "/tmp/$kfn" && break + sleep 1 + done' rm "${ROOTFSDIR}/tmp/$kfn" done -- 2.26.2