From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6875334414772994048 X-Received: by 2002:a7b:c4d3:: with SMTP id g19mr3808624wmk.165.1600938661252; Thu, 24 Sep 2020 02:11:01 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:a1c:c2c1:: with SMTP id s184ls1144576wmf.2.canary-gmail; Thu, 24 Sep 2020 02:11:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx2cSqRZO3FAPk70vx+TQSx8YmdZeEp50udF9CRuokYpmHL+Y7ZrjeDYLKTtsbVZZKBDh31 X-Received: by 2002:a1c:e1c2:: with SMTP id y185mr3846014wmg.182.1600938660202; Thu, 24 Sep 2020 02:11:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600938660; cv=none; d=google.com; s=arc-20160816; b=HgPGY9y3RIibPP4z8PzWerxBoco9rDfsaaoI+JNsumEapp1uffmQtS84rolrkZwv/D KgH3BFalIgPUVTqCBg1HOuRn+B2gJhZEh5okOF4fbeSN4ymlSWg2KmKqe6d41Eids8j2 XJHdt+D2GhVOJLMcO75L+1kWDLknlw4j1AhMlKZOg+ILnny/dwT4RX33WKj64gjGC0MY 7TzNEp8Y6+2MbamWiuCLnRSid5UFWg/K7z2ZAhUxqDYxi7efZmbuDNpjfpzw8Qlgry7Q A05BmwbZG/flNFfjtIoOQ8urYWq+MxxPSclUBrYVgROy32hZ1EGlbBk4PM2uzby17giP UdrA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:content-language:in-reply-to:mime-version :user-agent:date:message-id:from:references:to:subject; bh=rn5anVWI8N5QMZv0iIBzi/NxMpCMYMmU7lVF5bjFPYw=; b=Tgye5ItaTdj2CaSWQBGCocy4uq0sruLUhNrsE9pyC2VCh2H8045+mpjvIj3NihWnka aNMSackKl9/VDlF8AUthCTTAceWOyur+1LQ34rhb/pEZfOvYWiFAQDRZXc4jV/Dvn7g1 IbnZ6iS6H+qVbyVdJMJCKQScrTWyhWtF0bHRWAhOj/9Z+RCSgOySBA2EFyE2ENRyx+sg 0pjxktD0ze38/58GCZH2mP49g2ooWSmdaXPWSyoJifZkak6lPOE32ymVGfv4kHE6Kr6s sP1b/zaGTsD1XtKaC4mz8Y3twgyqXhW6/oOOjve2v/f74pR3EULX5+klbfSUhB36ZPhb FSEw== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.28 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from goliath.siemens.de (goliath.siemens.de. [192.35.17.28]) by gmr-mx.google.com with ESMTPS id c144si60845wme.2.2020.09.24.02.11.00 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Thu, 24 Sep 2020 02:11:00 -0700 (PDT) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.28 as permitted sender) client-ip=192.35.17.28; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.28 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail2.sbs.de (mail2.sbs.de [192.129.41.66]) by goliath.siemens.de (8.15.2/8.15.2) with ESMTPS id 08O9AxxE015436 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Thu, 24 Sep 2020 11:10:59 +0200 Received: from [167.87.1.32] ([167.87.1.32]) by mail2.sbs.de (8.15.2/8.15.2) with ESMTP id 08O9AxTp021531 for ; Thu, 24 Sep 2020 11:10:59 +0200 Subject: [PATCH v4 16/16] isar-bootstrap: Connect to gpg-agent before adding keys To: isar-users References: <318651e8-1fa0-0928-8a7d-263cb81aba6a@siemens.com> <20200923202916.GV16317@yssyq.m.ilbers.de> From: Jan Kiszka Message-ID: Date: Thu, 24 Sep 2020 11:10:59 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.12.0 MIME-Version: 1.0 In-Reply-To: <20200923202916.GV16317@yssyq.m.ilbers.de> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-TUID: YzUJUj+5d5RX From: Jan Kiszka We have recurring issues in CI with the gpg-agent not being ready when trying to use apt-key: gpg: can't connect to the agent: IPC connect call failed Work around this by connecting upfront to the agent, retrying that in a bounded loop. Signed-off-by: Jan Kiszka --- This one seems to work fine. Not sure if killing the agent is needed. In most cases, Isar runs in more (VMs) or less (containers) isolated environments anyway. I case it doesn't, wouldn't killing possibly affects what the user started before running Isar? meta/recipes-core/isar-bootstrap/isar-bootstrap.inc | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/meta/recipes-core/isar-bootstrap/isar-bootstrap.inc b/meta/recipes-core/isar-bootstrap/isar-bootstrap.inc index fbfe669d..1c5dba74 100644 --- a/meta/recipes-core/isar-bootstrap/isar-bootstrap.inc +++ b/meta/recipes-core/isar-bootstrap/isar-bootstrap.inc @@ -303,10 +303,13 @@ isar_bootstrap() { "${ROOTFSDIR}/etc/apt/apt.conf.d/50isar.conf" find ${APT_KEYS_DIR}/ -type f | while read keyfile do - kfn="$(basename $keyfile)" + export kfn="$(basename $keyfile)" cp $keyfile "${ROOTFSDIR}/tmp/$kfn" - chroot "${ROOTFSDIR}" /usr/bin/apt-key \ - --keyring ${THIRD_PARTY_APT_KEYRING} add "/tmp/$kfn" + chroot "${ROOTFSDIR}" sh -c ' + for i in $(seq 10); do + /usr/bin/apt-key --keyring ${THIRD_PARTY_APT_KEYRING} add "/tmp/$kfn" && break + sleep 1 + done' rm "${ROOTFSDIR}/tmp/$kfn" done -- 2.26.2