> > > >> from where you got CONFIG_MODULE_SIG_FORMAT? CONFIG_MODULE_SIG is > > >> the trigger to create this binary: > > >> > > >> scripts/Makefile:hostprogs-$(CONFIG_MODULE_SIG)+= sign-file > > >> > > > > > > I was looking at kernel 5.6. > > > > > > Then we likely need multiple condition when to run sign-file while > > > building an external module. > > > > > > And we also need some idea how to deploy the shared keys to all > > > recipes. If we only talk about two or three, the kernel recipe > > > could carry the keys as artifacts, and other recipes would simply > > > link them. But that is not really nice to maintain. We could, of > > > course, package the keys into linux-headers. Downside: Someone may > > > then accidentally ship them on a device. > > > > maybe we can use a separate package? e.g. kernel-module-signkeys? > > > > normally this package will be only used for building, we can output > > an error during isar build when someone installs this package to the > > image (prevents "accidentally ship them on a device") > > > > next point: can we avoid somehow with isar that this package is > > showing up in some apt repo (outside isar build system)? > > All packages isar builds for an image show up in a repo called > "isar-apt" that is strictly internal. > > If you choose to make use of the rebuild cache that will be another > repo - "base-apt". "base-apt" can be published and used for consecutive > (re-)builds. > > Isar does not publish anything on its own, nothing to be afraid of. > ok my misunderstanding, because "isar-apt" resides in the deploy subdirectory, I was assuming it may get published at some point (openembedded/poky had also an ipk subdirectory in deploy which could serve as an external ipk repo). means this "base-apt" gets only generated when I was using "-c cache_base_repo"? about this directory I am not afraid, it contains no self-built packages. kernel-headers-cip resides in "isar-apt", so I was more worried about this apt repo.